MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7df8afb0d2aec1dd137524dbf1b065d43402f8a6d214b7d15f2e4bdcdec95c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: c7df8afb0d2aec1dd137524dbf1b065d43402f8a6d214b7d15f2e4bdcdec95c9
SHA3-384 hash: a11835503bbfdbfc5c338eac80bcf8ddac429bd2eb9c1930112610fbc90d763be1656337e7f64a84a6197bb9128335b9
SHA1 hash: b994439d03d26ec1948f0ca4ea4e780930a1b0df
MD5 hash: 6667feda2ff8966d8e08ba0ac2afcd49
humanhash: salami-apart-tennis-seventeen
File name:wget.sh
Download: download sample
Signature Mirai
File size:1'140 bytes
First seen:2026-01-05 13:45:53 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:6j+ELbMB3VEczLNIZEtqDEVKT5CEHU/EO99MET0P3E3eMCbEKP3eEz6gE19mdEkF:gCjnvQZajpgEetPXAqrx
TLSH T1DF2124CF1064B96A504CCF4030AA16853AE9CBE1F1748E175D8078F388C8603B6B8FDB
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.28/Fantazy/Fantazy.arm45f4ead21261a4872c7bbdc341a3cab2d09a881bc1ca20a78f3cbe3800cd54f0d Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.arm59df7c2bebdee16b4907509ea8cdfc4128a8c2c0fb21156ed8105db2cf8f4ecf2 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.arm69c6625a0a04aee9ac1fe10d55edc2f0aa77f66593916a10cb8314ad29457edeb Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.arm748b94eff6e2031ce3fd8f0c605917b5a55b26a2d9e1800b9612758189e794631 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.m68k4b6f0caf42dc42e3f8f4e7adc9a93435cb27d604df131e19503be23fbc955826 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.mips9997ba3aad89be8f8371620b5b841eaa71da6f32368d84363bab6dd57303929c Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.mpsleeb8b37ab92777cbe5c49834cc044393207e0b745a0e2d0806b7da4e6292000b Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.ppc1f0a93ffbe48da5f9d8188060be1d5ce128fdc1545c2077a22bff830b19302cf Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.sh469a6fc590d0f527d1c6e04a9cf1c84eb52ca88de7867e8e8cf31b0b67d94eb70 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.spcd1d3129a68b9da3ed82981110c4d48721d47a176134b004e4e34544d1e2b1cd9 Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.x86ad613cf0f480c1c00f15379fc0df01af6d6c14309c9d0e452bd5e71ec6342c0f Miraielf mirai
http://130.12.180.28/Fantazy/Fantazy.x86_645443d764e399f0cd44ef17ea0940db73fc635045faa26f0ce8a4d8b3453b5988 Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
59
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2026-01-05T10:53:00Z UTC
Last seen:
2026-01-06T00:55:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.cl
Status:
terminated
Behavior Graph:
%3 guuid=e3c81213-2100-0000-b51e-9976480a0000 pid=2632 /usr/bin/sudo guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639 /tmp/sample.bin guuid=e3c81213-2100-0000-b51e-9976480a0000 pid=2632->guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639 execve guuid=0b732415-2100-0000-b51e-9976510a0000 pid=2641 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=0b732415-2100-0000-b51e-9976510a0000 pid=2641 execve guuid=0d6d871c-2100-0000-b51e-9976650a0000 pid=2661 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=0d6d871c-2100-0000-b51e-9976650a0000 pid=2661 execve guuid=cc53c01c-2100-0000-b51e-9976670a0000 pid=2663 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=cc53c01c-2100-0000-b51e-9976670a0000 pid=2663 clone guuid=8c44421d-2100-0000-b51e-99766a0a0000 pid=2666 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=8c44421d-2100-0000-b51e-99766a0a0000 pid=2666 execve guuid=a02c2e23-2100-0000-b51e-99767b0a0000 pid=2683 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=a02c2e23-2100-0000-b51e-99767b0a0000 pid=2683 execve guuid=25887023-2100-0000-b51e-99767d0a0000 pid=2685 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=25887023-2100-0000-b51e-99767d0a0000 pid=2685 clone guuid=7697dd25-2100-0000-b51e-9976850a0000 pid=2693 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=7697dd25-2100-0000-b51e-9976850a0000 pid=2693 execve guuid=398fc72a-2100-0000-b51e-9976950a0000 pid=2709 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=398fc72a-2100-0000-b51e-9976950a0000 pid=2709 execve guuid=93b5012b-2100-0000-b51e-9976960a0000 pid=2710 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=93b5012b-2100-0000-b51e-9976960a0000 pid=2710 clone guuid=0db8792b-2100-0000-b51e-99769a0a0000 pid=2714 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=0db8792b-2100-0000-b51e-99769a0a0000 pid=2714 execve guuid=994e8330-2100-0000-b51e-9976ab0a0000 pid=2731 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=994e8330-2100-0000-b51e-9976ab0a0000 pid=2731 execve guuid=ea74bc30-2100-0000-b51e-9976ac0a0000 pid=2732 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=ea74bc30-2100-0000-b51e-9976ac0a0000 pid=2732 clone guuid=26357931-2100-0000-b51e-9976b10a0000 pid=2737 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=26357931-2100-0000-b51e-9976b10a0000 pid=2737 execve guuid=22d1bc35-2100-0000-b51e-9976be0a0000 pid=2750 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=22d1bc35-2100-0000-b51e-9976be0a0000 pid=2750 execve guuid=e54cf935-2100-0000-b51e-9976c00a0000 pid=2752 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=e54cf935-2100-0000-b51e-9976c00a0000 pid=2752 clone guuid=cbc8d137-2100-0000-b51e-9976c50a0000 pid=2757 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=cbc8d137-2100-0000-b51e-9976c50a0000 pid=2757 execve guuid=e8184e3d-2100-0000-b51e-9976d30a0000 pid=2771 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=e8184e3d-2100-0000-b51e-9976d30a0000 pid=2771 execve guuid=947bc83d-2100-0000-b51e-9976d50a0000 pid=2773 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=947bc83d-2100-0000-b51e-9976d50a0000 pid=2773 clone guuid=e0544c3e-2100-0000-b51e-9976d80a0000 pid=2776 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=e0544c3e-2100-0000-b51e-9976d80a0000 pid=2776 execve guuid=d0384c44-2100-0000-b51e-9976de0a0000 pid=2782 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=d0384c44-2100-0000-b51e-9976de0a0000 pid=2782 execve guuid=328fa344-2100-0000-b51e-9976df0a0000 pid=2783 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=328fa344-2100-0000-b51e-9976df0a0000 pid=2783 clone guuid=97e63545-2100-0000-b51e-9976e20a0000 pid=2786 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=97e63545-2100-0000-b51e-9976e20a0000 pid=2786 execve guuid=d7cbf34a-2100-0000-b51e-9976ef0a0000 pid=2799 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=d7cbf34a-2100-0000-b51e-9976ef0a0000 pid=2799 execve guuid=0b0c304b-2100-0000-b51e-9976f10a0000 pid=2801 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=0b0c304b-2100-0000-b51e-9976f10a0000 pid=2801 clone guuid=8149ac4b-2100-0000-b51e-9976f30a0000 pid=2803 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=8149ac4b-2100-0000-b51e-9976f30a0000 pid=2803 execve guuid=c9aa7550-2100-0000-b51e-9976fc0a0000 pid=2812 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=c9aa7550-2100-0000-b51e-9976fc0a0000 pid=2812 execve guuid=cc65e650-2100-0000-b51e-9976fd0a0000 pid=2813 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=cc65e650-2100-0000-b51e-9976fd0a0000 pid=2813 clone guuid=137e8551-2100-0000-b51e-9976ff0a0000 pid=2815 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=137e8551-2100-0000-b51e-9976ff0a0000 pid=2815 execve guuid=7b170b56-2100-0000-b51e-99760b0b0000 pid=2827 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=7b170b56-2100-0000-b51e-99760b0b0000 pid=2827 execve guuid=4d376756-2100-0000-b51e-99760c0b0000 pid=2828 /usr/bin/dash guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=4d376756-2100-0000-b51e-99760c0b0000 pid=2828 clone guuid=6e975257-2100-0000-b51e-99760e0b0000 pid=2830 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=6e975257-2100-0000-b51e-99760e0b0000 pid=2830 execve guuid=21602b5c-2100-0000-b51e-9976150b0000 pid=2837 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=21602b5c-2100-0000-b51e-9976150b0000 pid=2837 execve guuid=9152995c-2100-0000-b51e-9976160b0000 pid=2838 /home/sandbox/Fantazy.x86 net guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=9152995c-2100-0000-b51e-9976160b0000 pid=2838 execve guuid=8a0bdb5c-2100-0000-b51e-99761a0b0000 pid=2842 /usr/bin/wget net send-data write-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=8a0bdb5c-2100-0000-b51e-99761a0b0000 pid=2842 execve guuid=a69dab63-2100-0000-b51e-9976290b0000 pid=2857 /usr/bin/chmod guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=a69dab63-2100-0000-b51e-9976290b0000 pid=2857 execve guuid=e64a1a64-2100-0000-b51e-99762b0b0000 pid=2859 /home/sandbox/Fantazy.x86_64 net guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=e64a1a64-2100-0000-b51e-99762b0b0000 pid=2859 execve guuid=cc6b338f-2200-0000-b51e-99763d0d0000 pid=3389 /usr/bin/rm delete-file guuid=9091db14-2100-0000-b51e-99764f0a0000 pid=2639->guuid=cc6b338f-2200-0000-b51e-99763d0d0000 pid=3389 execve b6a64ba0-71d1-5d3d-a9f9-c19471e8250a 130.12.180.28:80 guuid=0b732415-2100-0000-b51e-9976510a0000 pid=2641->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 148B guuid=8c44421d-2100-0000-b51e-99766a0a0000 pid=2666->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 148B guuid=7697dd25-2100-0000-b51e-9976850a0000 pid=2693->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 148B guuid=0db8792b-2100-0000-b51e-99769a0a0000 pid=2714->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 148B guuid=26357931-2100-0000-b51e-9976b10a0000 pid=2737->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 148B guuid=cbc8d137-2100-0000-b51e-9976c50a0000 pid=2757->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 148B guuid=e0544c3e-2100-0000-b51e-9976d80a0000 pid=2776->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 148B guuid=97e63545-2100-0000-b51e-9976e20a0000 pid=2786->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 147B guuid=8149ac4b-2100-0000-b51e-9976f30a0000 pid=2803->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 147B guuid=137e8551-2100-0000-b51e-9976ff0a0000 pid=2815->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 147B guuid=6e975257-2100-0000-b51e-99760e0b0000 pid=2830->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 147B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=9152995c-2100-0000-b51e-9976160b0000 pid=2838->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=eaefc85c-2100-0000-b51e-9976180b0000 pid=2840 /home/sandbox/Fantazy.x86 guuid=9152995c-2100-0000-b51e-9976160b0000 pid=2838->guuid=eaefc85c-2100-0000-b51e-9976180b0000 pid=2840 clone guuid=d275ce5c-2100-0000-b51e-9976190b0000 pid=2841 /home/sandbox/Fantazy.x86 net send-data zombie guuid=9152995c-2100-0000-b51e-9976160b0000 pid=2838->guuid=d275ce5c-2100-0000-b51e-9976190b0000 pid=2841 clone guuid=d275ce5c-2100-0000-b51e-9976190b0000 pid=2841->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 9bff2e1e-4e84-5ecd-918a-a1cdd4202ef3 130.12.180.28:63645 guuid=d275ce5c-2100-0000-b51e-9976190b0000 pid=2841->9bff2e1e-4e84-5ecd-918a-a1cdd4202ef3 send: 12B guuid=7882f35c-2100-0000-b51e-99761b0b0000 pid=2843 /home/sandbox/Fantazy.x86 guuid=d275ce5c-2100-0000-b51e-9976190b0000 pid=2841->guuid=7882f35c-2100-0000-b51e-99761b0b0000 pid=2843 clone guuid=b02df75c-2100-0000-b51e-99761c0b0000 pid=2844 /home/sandbox/Fantazy.x86 guuid=d275ce5c-2100-0000-b51e-9976190b0000 pid=2841->guuid=b02df75c-2100-0000-b51e-99761c0b0000 pid=2844 clone guuid=43cdfc5c-2100-0000-b51e-99761d0b0000 pid=2845 /home/sandbox/Fantazy.x86 net net-scan send-data guuid=d275ce5c-2100-0000-b51e-9976190b0000 pid=2841->guuid=43cdfc5c-2100-0000-b51e-99761d0b0000 pid=2845 clone guuid=8a0bdb5c-2100-0000-b51e-99761a0b0000 pid=2842->b6a64ba0-71d1-5d3d-a9f9-c19471e8250a send: 150B guuid=43cdfc5c-2100-0000-b51e-99761d0b0000 pid=2845->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=43cdfc5c-2100-0000-b51e-99761d0b0000 pid=2845|send-data send-data to 160 IP addresses review logs to see them all guuid=43cdfc5c-2100-0000-b51e-99761d0b0000 pid=2845->guuid=43cdfc5c-2100-0000-b51e-99761d0b0000 pid=2845|send-data send guuid=e64a1a64-2100-0000-b51e-99762b0b0000 pid=2859->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 349af0aa-1d52-5b54-ab86-2f426b84e968 0.0.0.0:59025 guuid=e64a1a64-2100-0000-b51e-99762b0b0000 pid=2859->349af0aa-1d52-5b54-ab86-2f426b84e968 con guuid=7240268f-2200-0000-b51e-99763b0d0000 pid=3387 /home/sandbox/Fantazy.x86_64 zombie guuid=e64a1a64-2100-0000-b51e-99762b0b0000 pid=2859->guuid=7240268f-2200-0000-b51e-99763b0d0000 pid=3387 clone guuid=9a672a8f-2200-0000-b51e-99763c0d0000 pid=3388 /home/sandbox/Fantazy.x86_64 net send-data zombie guuid=e64a1a64-2100-0000-b51e-99762b0b0000 pid=2859->guuid=9a672a8f-2200-0000-b51e-99763c0d0000 pid=3388 clone guuid=9a672a8f-2200-0000-b51e-99763c0d0000 pid=3388->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=9a672a8f-2200-0000-b51e-99763c0d0000 pid=3388->9bff2e1e-4e84-5ecd-918a-a1cdd4202ef3 send: 14B guuid=65f9348f-2200-0000-b51e-99763e0d0000 pid=3390 /home/sandbox/Fantazy.x86_64 guuid=9a672a8f-2200-0000-b51e-99763c0d0000 pid=3388->guuid=65f9348f-2200-0000-b51e-99763e0d0000 pid=3390 clone guuid=08b5398f-2200-0000-b51e-99763f0d0000 pid=3391 /home/sandbox/Fantazy.x86_64 zombie guuid=9a672a8f-2200-0000-b51e-99763c0d0000 pid=3388->guuid=08b5398f-2200-0000-b51e-99763f0d0000 pid=3391 clone guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392 /home/sandbox/Fantazy.x86_64 net net-scan send-data zombie guuid=9a672a8f-2200-0000-b51e-99763c0d0000 pid=3388->guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392 clone guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con d9a26686-a9a6-5763-86fd-74e6806c3ca4 38.249.100.104:23 guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392->d9a26686-a9a6-5763-86fd-74e6806c3ca4 send: 40B fae9d13b-88da-5145-bfe0-f4e41c55e4c1 147.127.254.136:23 guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392->fae9d13b-88da-5145-bfe0-f4e41c55e4c1 send: 40B guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392|send-data send-data to 4097 IP addresses review logs to see them all guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392->guuid=09d23e8f-2200-0000-b51e-9976400d0000 pid=3392|send-data send
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2026-01-05 13:46:12 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh c7df8afb0d2aec1dd137524dbf1b065d43402f8a6d214b7d15f2e4bdcdec95c9

(this sample)

  
Delivery method
Distributed via web download

Comments