MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1518ecbc5b3c7e4e5260b90165cf3064b26e111fe1199c2ecfc450139408351. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d1518ecbc5b3c7e4e5260b90165cf3064b26e111fe1199c2ecfc450139408351
SHA3-384 hash: c55775090c465ccdd3da120f97fa42ee17bd4727d11e1e95e9e4b2b17838e2cfd18e0455e70119d5c0536a8459aa8484
SHA1 hash: f5f7b04335de10aaad3def82e1d5ef3671abaf03
MD5 hash: ddd9dcb8b62a3386bcd89ffa6b9f2c26
humanhash: mockingbird-uniform-cold-zulu
File name:wget.sh
Download: download sample
Signature Mirai
File size:1'795 bytes
First seen:2026-03-17 04:51:01 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:Q0uMRpRsjgFVqHwEfsLZapkID+9stZu2UX2lrl6l/IQt0bjnLE/+MK35X:QR7UbgbUMq2+WtDIYxo0/CKpX
TLSH T1DF31FE8B68035AF38E9A82BFD7A7F65131553053A5274D00FADF27245F2490635D1ECA
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter adliwahid
Tags:mirai
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.152.233/bins/n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Status:
terminated
Behavior Graph:
%3 guuid=4bc73c44-1600-0000-5a0b-767a990b0000 pid=2969 /usr/bin/sudo guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975 /tmp/sample.bin guuid=4bc73c44-1600-0000-5a0b-767a990b0000 pid=2969->guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975 execve guuid=22eda347-1600-0000-5a0b-767aa00b0000 pid=2976 /usr/bin/uname guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=22eda347-1600-0000-5a0b-767aa00b0000 pid=2976 execve guuid=a6803248-1600-0000-5a0b-767aa20b0000 pid=2978 /usr/bin/wget net send-data guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=a6803248-1600-0000-5a0b-767aa20b0000 pid=2978 execve guuid=f5f14451-1600-0000-5a0b-767ab60b0000 pid=2998 /usr/bin/busybox net send-data guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=f5f14451-1600-0000-5a0b-767ab60b0000 pid=2998 execve guuid=52de7a58-1600-0000-5a0b-767ac60b0000 pid=3014 /usr/bin/curl net send-data write-file guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=52de7a58-1600-0000-5a0b-767ac60b0000 pid=3014 execve guuid=212f9e65-1600-0000-5a0b-767af40b0000 pid=3060 /usr/bin/chmod guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=212f9e65-1600-0000-5a0b-767af40b0000 pid=3060 execve guuid=377acf65-1600-0000-5a0b-767af60b0000 pid=3062 /tmp/px86_64 guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=377acf65-1600-0000-5a0b-767af60b0000 pid=3062 execve guuid=ad32d465-1600-0000-5a0b-767af70b0000 pid=3063 /usr/bin/sleep guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=ad32d465-1600-0000-5a0b-767af70b0000 pid=3063 execve guuid=67310aa2-1600-0000-5a0b-767a6e0c0000 pid=3182 /usr/bin/pgrep guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=67310aa2-1600-0000-5a0b-767a6e0c0000 pid=3182 execve guuid=1dd95ea7-1600-0000-5a0b-767a770c0000 pid=3191 /tmp/px86_64 zombie guuid=8dd05a47-1600-0000-5a0b-767a9f0b0000 pid=2975->guuid=1dd95ea7-1600-0000-5a0b-767a770c0000 pid=3191 execve 72af6dc9-e0e7-5186-a050-4a3a967dfc62 94.156.152.233:80 guuid=a6803248-1600-0000-5a0b-767aa20b0000 pid=2978->72af6dc9-e0e7-5186-a050-4a3a967dfc62 send: 141B guuid=f5f14451-1600-0000-5a0b-767ab60b0000 pid=2998->72af6dc9-e0e7-5186-a050-4a3a967dfc62 send: 89B guuid=52de7a58-1600-0000-5a0b-767ac60b0000 pid=3014->72af6dc9-e0e7-5186-a050-4a3a967dfc62 send: 90B
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2026-03-16 01:57:52 UTC
File Type:
Text (Shell)
AV detection:
7 of 22 (31.82%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:mirai botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads CPU attributes
UPX packed file
Enumerates running processes
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Modifies Watchdog functionality
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments