MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd4981f5760f3e5603573af47548615c483dc3f8be3fce1fc03ced6f33ee3774. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: cd4981f5760f3e5603573af47548615c483dc3f8be3fce1fc03ced6f33ee3774
SHA3-384 hash: 11a90355a335b553adf06884c1a5f774905c7d1fd2ed4a49cb7ee758d79a5b4af74559cd03e0787129ba3a03e427f71a
SHA1 hash: 087378ef1c95f241495451699ac3fdb4a4fa9152
MD5 hash: 64e85ecc8f736d242512fd1717c963e9
humanhash: triple-nevada-california-timing
File name:ssh.sh
Download: download sample
Signature Mirai
File size:1'889 bytes
First seen:2025-09-09 06:17:30 UTC
Last seen:2025-09-09 08:34:47 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 24:boWBGhBh9Mk8QoOwb6Qin/cdYzUWe6v3c3qKiouKjwb+ku8nd1GsTIU+KPfFwbau:boGGhL8QoFotF+2k3e394
TLSH T1FA41349CB872E2324D5E9E84B492C164A01791D721704F2AAC5F1F37FCEEB10F858B28
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.48/mipsfd75057993af111cf29aeb0924554d01ad28c071fb20cf9700831fd4402fbaf2 Miraielf gafgyt geofenced mips mirai ua-wget USA
http://160.250.134.48/mpslfc2117cb6a4433fc0a3711ce912f4a1794741dfe467cf7c64ac9250e125b927c Miraielf geofenced mips mirai ua-wget USA
http://160.250.134.48/arme16a5e543be159372994cf2bd528b703cfc4ebe667e153a34de20e13de0bc265 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm5ef0759560923799625dbffbc95e23935d0c09da4aad0e7e285a24510c1255a97 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm76509f8d5312e74b83dcc973477b33d6a439bc050545d2bc54962f9b43d8ddf88 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/skid.x86184e543bf7ae13dbecadc8879eacda3c5dde6225b16ac0b4ee9ce01eb7e576d9 Miraicensys elf mirai ua-wget
ftp://0.250.134.48:8021/mipsn/an/an/a
ftp://0.250.134.48:8021/mpsln/an/an/a
ftp://0.250.134.48:8021/armn/an/an/a
ftp://0.250.134.48:8021/arm5n/an/an/a
ftp://0.250.134.48:8021/arm7n/an/an/a

Intelligence


File Origin
# of uploads :
2
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-09T03:26:00Z UTC
Last seen:
2025-09-09T03:26:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-09-09 05:59:23 UTC
File Type:
Text (Shell)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (32372) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh cd4981f5760f3e5603573af47548615c483dc3f8be3fce1fc03ced6f33ee3774

(this sample)

  
Delivery method
Distributed via web download

Comments