MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ced51432bd57c6f15ebaf2dcb159e353b2b1579b321e500e8a675390f5caa5b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: ced51432bd57c6f15ebaf2dcb159e353b2b1579b321e500e8a675390f5caa5b6
SHA3-384 hash: cdf089e628dd8db23b166914c5cca8867e9d3857dbcccf3a791c5a99e94a6a1bb9d59ceb6c17e63c8bd4a8dfe9af5bb3
SHA1 hash: edc7e939ea6243babf15bdc7412ba5d4e1584d9f
MD5 hash: 1c64a460dc6c0e090d33d0cd052e4548
humanhash: timing-montana-rugby-alanine
File name:x86.sh
Download: download sample
Signature Mirai
File size:975 bytes
First seen:2026-01-01 12:31:02 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:dUMtcUDdcdUeNUzNI3lTcUA0Kl2mUcUN6hUXRncUGFG30cUyMUBzUBBwUNTd4A:dtpcdWNI1ZKlm6CzHWvRZ
TLSH T1B511EFE541B64E16C1A9CDCC38B988385089D5C6ACA3CFCCDC7C497A1EC7D6D7106E8A
Magika csv
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.208.27/bins/parm74274cc3016ed06a7b19211372807dbf087efe4fc19643d8615e740890995c20 Miraielf mirai ua-wget
http://158.94.208.27/bins/pm58kn/an/aelf ua-wget
http://158.94.208.27/bins/parm555ef872e61c4b4b37f629c02efca7e2b1cbea444da91af9dd1aaf1675366db3a Miraielf mirai ua-wget
http://158.94.208.27/bins/parm6b5ecd9986333d5dbf1e62c879bf196676deb09fc40c1e55ae641210cad53d978 Miraielf mirai ua-wget
http://158.94.208.27/bins/parm73d39bbd00e38822b51e2c63dd338a5751d6c05634bd6c7293ef1177d1d3f8a14 Miraielf mirai ua-wget
http://158.94.208.27/bins/psh458d58774c2c497deb1f96eb0cadc065dc8699a04c38111d212fcc68808a85cbe Miraielf mirai ua-wget
http://158.94.208.27/bins/pppc2c05935c19ede9cccaa1a274c93c7deab438e27f141120642aafd377ae4463bf Miraielf mirai ua-wget
http://158.94.208.27/bins/pmipsf8a94465e9304bde873bd3c8cd1f939097b7312fc1c7845c8499b274e16bd869 Miraielf mirai ua-wget
http://158.94.208.27/bins/pmpsl4947526318630ed5a8f64b762c62eec0e127a0aafdcba72cf860a26375906109 Miraielf mirai ua-wget
http://158.94.208.27/bins/pspcb13baeead8922b19bd7a24a12d7fd3a1c7d5e9845012a65fcde792b9527a7b5b Miraielf mirai ua-wget
http://158.94.208.27/bins/px8622e5a9e790fe5bcfd184634d3d779ddea70bcb4e216ac7fe346679c15f2b610c Miraielf mirai ua-wget
http://158.94.208.27/bins/px86_64n/an/aelf ua-wget
http://158.94.208.27/bins/pi686n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
42
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Verdict:
Malicious
File Type:
ps1
First seen:
2026-01-01T09:37:00Z UTC
Last seen:
2026-01-02T23:37:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-01 12:31:19 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh ced51432bd57c6f15ebaf2dcb159e353b2b1579b321e500e8a675390f5caa5b6

(this sample)

  
Delivery method
Distributed via web download

Comments