MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7a2582b5914cb5f0218f72b1c2355cd244bba0ee0a5657970fff54f9b9eec29. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: c7a2582b5914cb5f0218f72b1c2355cd244bba0ee0a5657970fff54f9b9eec29
SHA3-384 hash: 1281be7e5ad8e0164b64c67fac1adeea49618933e0c89c586cf547e511f8f3dc3fe7969b85df3c5cdbaa9417eccdff8f
SHA1 hash: 69bb4a61f2202648acd4c0451a363511951c8079
MD5 hash: b91830e3ad76ab7e4f0a06a4bcf8718b
humanhash: south-idaho-mango-william
File name:1.sh
Download: download sample
Signature Mirai
File size:2'989 bytes
First seen:2026-02-05 21:33:10 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:i8Jhml83nEl8kCXl8IePl8abazvZl8alaFvjl89N99z4gel8rjcl8USvl8jbjzq8:iCmliElaXliPlBWzvZlBUFvjlKRz4ZlD
TLSH T16F515FD703B145393E667AA7FDB98E2C318351B918E36F489ADC34A65B8CD88B044F47
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://192.109.200.60/hiddenbin/Space.arc7e1846421f201655226f0191278f145fe426f580d30629aba76897308237468e Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.x8606bcf2874e28168141d1fc376eccf9a75437a12f526165cda962cf023ac36c8d Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.x86_64n/an/aelf ua-wget
http://192.109.200.60/hiddenbin/Space.i686n/an/aelf ua-wget
http://192.109.200.60/hiddenbin/Space.mipsd25b11fb21faa4ef48d6133c9accdd84739d5678ee4ae3ee5697cda771950bb0 Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.mips64n/an/aelf ua-wget
http://192.109.200.60/hiddenbin/Space.mpslddce6cfb7116be01e0a01dda4c56e30dd9a084773055fc69d9d19cf0c35317b5 Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.armb07dab2024d1276af88972520f37ce73b5b2923359f8d58879813746813d23fa Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.arm579b4a450651107d2415de00b9f93ecfb47a5f05191a512193b102a05d780d79a Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.arm66c8404ba7aed2d2be6c21cbd2a2b49d89fa09c14278fad49c80ef1088300382c Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.arm723e0c2ea87f14093cdb260227edce41edf22c68da305b32e66f896cfab377c11 Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.ppc52eaf552dbeeccb6b920271ca1d96bc0145433bdbf215610b27c74a521a6a06d Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.sparcn/an/aelf ua-wget
http://192.109.200.60/hiddenbin/Space.m68k31d5f5491ec3d4f87532fc7e0e7deb2acd65905344c3d308b3842330a187223f Miraimirai opendir
http://192.109.200.60/hiddenbin/Space.sh498eb5b795ff9ad48cef00b09a1c4448415d869d2f60ef04b9a54ae45e4d69e21 Miraimirai opendir

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-02-02T12:25:00Z UTC
Last seen:
2026-02-03T10:47:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-02-02 21:38:28 UTC
File Type:
Text (Shell)
AV detection:
22 of 36 (61.11%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
UPX packed file
Enumerates running processes
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c7a2582b5914cb5f0218f72b1c2355cd244bba0ee0a5657970fff54f9b9eec29

(this sample)

  
Delivery method
Distributed via web download

Comments