MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7d48107a4fb5cf55052476cbcd8c658d0d13483cee3356a8b3ca6b279775a66. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: c7d48107a4fb5cf55052476cbcd8c658d0d13483cee3356a8b3ca6b279775a66
SHA3-384 hash: 1f9ab6d3376e2642e6c3462a6e04eabcb077097ccd1b4223768d5c2a1ed426ba3f520d97b60e246e295af9953f91d67d
SHA1 hash: 690458dd1549b8f1abe32a170ee5c99e7692a304
MD5 hash: 6cf6561716d982ad1242a437a4345fa6
humanhash: india-stairway-shade-monkey
File name:lilin.sh
Download: download sample
Signature Mirai
File size:106 bytes
First seen:2026-02-12 06:30:19 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:L+mIcTEXIQ1ibJLKoSPQHcLKbKRJMJ0:LPzDFKXQH6K+vMJ0
TLSH T1E9B012A90D14319FF00317322070C131E46CC3613350C737BC7C2490484841C30A4DAC
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://144.31.203.91/arm5.dbgb3e091224abfb5d6e9272a30f9968301ad5f4c6f4849266ed8cae32d3ebf8112 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
expand lolbin
Result
Gathering data
Verdict:
Malicious
File Type:
text
First seen:
2026-02-12T03:37:00Z UTC
Last seen:
2026-02-12T03:37:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=5995fd0d-1b00-0000-efbf-d62957090000 pid=2391 /usr/bin/sudo guuid=eccf5c10-1b00-0000-efbf-d6295b090000 pid=2395 /tmp/sample.bin guuid=5995fd0d-1b00-0000-efbf-d62957090000 pid=2391->guuid=eccf5c10-1b00-0000-efbf-d6295b090000 pid=2395 execve guuid=cc76ab10-1b00-0000-efbf-d6295c090000 pid=2396 /usr/bin/wget net send-data write-file guuid=eccf5c10-1b00-0000-efbf-d6295b090000 pid=2395->guuid=cc76ab10-1b00-0000-efbf-d6295c090000 pid=2396 execve guuid=991c2522-1b00-0000-efbf-d62976090000 pid=2422 /usr/bin/chmod guuid=eccf5c10-1b00-0000-efbf-d6295b090000 pid=2395->guuid=991c2522-1b00-0000-efbf-d62976090000 pid=2422 execve guuid=250a7e22-1b00-0000-efbf-d62978090000 pid=2424 /usr/bin/dash guuid=eccf5c10-1b00-0000-efbf-d6295b090000 pid=2395->guuid=250a7e22-1b00-0000-efbf-d62978090000 pid=2424 clone d8af8e8d-8b36-5d0a-84f3-90691231a286 144.31.203.91:80 guuid=cc76ab10-1b00-0000-efbf-d6295c090000 pid=2396->d8af8e8d-8b36-5d0a-84f3-90691231a286 send: 136B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c7d48107a4fb5cf55052476cbcd8c658d0d13483cee3356a8b3ca6b279775a66

(this sample)

  
Delivery method
Distributed via web download

Comments