MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d2e4d3ae1b9c5e4e28b0b6852bb66c3c05e4d439f64349aa8306744bbf613c50. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: d2e4d3ae1b9c5e4e28b0b6852bb66c3c05e4d439f64349aa8306744bbf613c50
SHA3-384 hash: f58ec560b3afd25ac9578a19c62afcff2ca6ee21a87c7ea11a58f28460374a799653500945600cb7cf4133f99e05ee86
SHA1 hash: 228c05fc35582a2f4777da5849e8d1b747b42f1a
MD5 hash: 881ca21f5729d4b2dd234b743b3b9cf1
humanhash: tennis-iowa-harry-arizona
File name:wget.sh
Download: download sample
Signature Mirai
File size:889 bytes
First seen:2025-09-14 11:36:55 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:M0XX5BhIX/XTWXXaJ2XbBMX2qTCMXtjXAXo2Xfn:M0XJByX/KXKJ2XbyX2q+MX1XAXfXfn
TLSH T19F11C4DEE2D2B972846CDD197D33465C200682CE6D6B8FDFFC6A047454D2A907190E89
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.94.209.216/arcee9180bd2b165795dfaaf5d6de60148d34353c66373cc322e49eaf532de435f9 Miraielf mirai
http://158.94.209.216/arm14883298489d57b2242533f561769e8f21737126e8560c4b9955dc701478c23e Mirai32-bit elf mirai Mozi
http://158.94.209.216/arm582ee72be70e8dce122910449268514083943892258ea9b9d21068e03286d03f8 Miraielf mirai
http://158.94.209.216/arm657a6ba282a2ffad3469d83844906606272225fdaeb15c2e2043a11978240de4b Miraielf mirai
http://158.94.209.216/arm75a469ba94c55f39fdf0656a0a1b98c988d699569397587d8e1141a0d928b9eea Miraielf mirai
http://158.94.209.216/mips77637c28bd5ccda2ad3c90c2d34e879fa7e10f1abe04520e5bda11cd7ed69c8e Gafgyt32-bit elf gafgyt Mozi
http://158.94.209.216/mpslafe59ccdfac00527b2983101bc1e5d91361609b4753962e0cb2cc890b8a35d2f Gafgytelf gafgyt
http://158.94.209.216/ppca8de55bad2e1d7f6821139880b74b7345a242dd8f6296f626cdceb07d5f5742e Miraielf mirai
http://158.94.209.216/sh471cf2bcec3f927abc59bb4a57e950a1685ce005380b6a2e3dad891788828dc07 Gafgytelf gafgyt mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-09-14T08:48:00Z UTC
Last seen:
2025-09-14T08:48:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=c7b14f9b-1a00-0000-d362-53b17b0a0000 pid=2683 /usr/bin/sudo guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694 /tmp/sample.bin guuid=c7b14f9b-1a00-0000-d362-53b17b0a0000 pid=2683->guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694 execve guuid=a72ad59e-1a00-0000-d362-53b1870a0000 pid=2695 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=a72ad59e-1a00-0000-d362-53b1870a0000 pid=2695 execve guuid=32c183a8-1a00-0000-d362-53b1a90a0000 pid=2729 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=32c183a8-1a00-0000-d362-53b1a90a0000 pid=2729 execve guuid=a540baa8-1a00-0000-d362-53b1aa0a0000 pid=2730 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=a540baa8-1a00-0000-d362-53b1aa0a0000 pid=2730 clone guuid=f43c32a9-1a00-0000-d362-53b1ae0a0000 pid=2734 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=f43c32a9-1a00-0000-d362-53b1ae0a0000 pid=2734 execve guuid=f1c597a9-1a00-0000-d362-53b1b00a0000 pid=2736 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=f1c597a9-1a00-0000-d362-53b1b00a0000 pid=2736 execve guuid=d92449b6-1a00-0000-d362-53b1ca0a0000 pid=2762 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=d92449b6-1a00-0000-d362-53b1ca0a0000 pid=2762 execve guuid=3a3a9cb6-1a00-0000-d362-53b1cb0a0000 pid=2763 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=3a3a9cb6-1a00-0000-d362-53b1cb0a0000 pid=2763 clone guuid=56b06ab7-1a00-0000-d362-53b1cd0a0000 pid=2765 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=56b06ab7-1a00-0000-d362-53b1cd0a0000 pid=2765 execve guuid=c12fe1b7-1a00-0000-d362-53b1ce0a0000 pid=2766 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=c12fe1b7-1a00-0000-d362-53b1ce0a0000 pid=2766 execve guuid=f0ceb7c4-1a00-0000-d362-53b1e40a0000 pid=2788 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=f0ceb7c4-1a00-0000-d362-53b1e40a0000 pid=2788 execve guuid=495506c5-1a00-0000-d362-53b1e60a0000 pid=2790 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=495506c5-1a00-0000-d362-53b1e60a0000 pid=2790 clone guuid=13ebd9c5-1a00-0000-d362-53b1e80a0000 pid=2792 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=13ebd9c5-1a00-0000-d362-53b1e80a0000 pid=2792 execve guuid=51412cc6-1a00-0000-d362-53b1ea0a0000 pid=2794 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=51412cc6-1a00-0000-d362-53b1ea0a0000 pid=2794 execve guuid=f0970ed3-1a00-0000-d362-53b1fd0a0000 pid=2813 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=f0970ed3-1a00-0000-d362-53b1fd0a0000 pid=2813 execve guuid=30a460d3-1a00-0000-d362-53b1ff0a0000 pid=2815 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=30a460d3-1a00-0000-d362-53b1ff0a0000 pid=2815 clone guuid=ac52fbd4-1a00-0000-d362-53b1050b0000 pid=2821 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=ac52fbd4-1a00-0000-d362-53b1050b0000 pid=2821 execve guuid=9a1667d5-1a00-0000-d362-53b1060b0000 pid=2822 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=9a1667d5-1a00-0000-d362-53b1060b0000 pid=2822 execve guuid=7acc62e2-1a00-0000-d362-53b11f0b0000 pid=2847 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=7acc62e2-1a00-0000-d362-53b11f0b0000 pid=2847 execve guuid=c51fa3e2-1a00-0000-d362-53b1200b0000 pid=2848 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=c51fa3e2-1a00-0000-d362-53b1200b0000 pid=2848 clone guuid=769574e4-1a00-0000-d362-53b1250b0000 pid=2853 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=769574e4-1a00-0000-d362-53b1250b0000 pid=2853 execve guuid=525434e5-1a00-0000-d362-53b1280b0000 pid=2856 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=525434e5-1a00-0000-d362-53b1280b0000 pid=2856 execve guuid=d6e60af2-1a00-0000-d362-53b1420b0000 pid=2882 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=d6e60af2-1a00-0000-d362-53b1420b0000 pid=2882 execve guuid=3f5a62f2-1a00-0000-d362-53b1430b0000 pid=2883 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=3f5a62f2-1a00-0000-d362-53b1430b0000 pid=2883 clone guuid=c1b8b1f4-1a00-0000-d362-53b14a0b0000 pid=2890 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=c1b8b1f4-1a00-0000-d362-53b14a0b0000 pid=2890 execve guuid=35f7f2f4-1a00-0000-d362-53b14c0b0000 pid=2892 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=35f7f2f4-1a00-0000-d362-53b14c0b0000 pid=2892 execve guuid=5bfdff02-1b00-0000-d362-53b16c0b0000 pid=2924 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=5bfdff02-1b00-0000-d362-53b16c0b0000 pid=2924 execve guuid=dbe39e03-1b00-0000-d362-53b16d0b0000 pid=2925 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=dbe39e03-1b00-0000-d362-53b16d0b0000 pid=2925 clone guuid=f3c56a05-1b00-0000-d362-53b16f0b0000 pid=2927 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=f3c56a05-1b00-0000-d362-53b16f0b0000 pid=2927 execve guuid=37721d06-1b00-0000-d362-53b1710b0000 pid=2929 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=37721d06-1b00-0000-d362-53b1710b0000 pid=2929 execve guuid=46b81913-1b00-0000-d362-53b17f0b0000 pid=2943 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=46b81913-1b00-0000-d362-53b17f0b0000 pid=2943 execve guuid=74391514-1b00-0000-d362-53b1800b0000 pid=2944 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=74391514-1b00-0000-d362-53b1800b0000 pid=2944 clone guuid=16fb9615-1b00-0000-d362-53b1820b0000 pid=2946 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=16fb9615-1b00-0000-d362-53b1820b0000 pid=2946 execve guuid=6df83916-1b00-0000-d362-53b1840b0000 pid=2948 /usr/bin/busybox net send-data write-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=6df83916-1b00-0000-d362-53b1840b0000 pid=2948 execve guuid=ea0e3723-1b00-0000-d362-53b18e0b0000 pid=2958 /usr/bin/chmod guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=ea0e3723-1b00-0000-d362-53b18e0b0000 pid=2958 execve guuid=26b29a23-1b00-0000-d362-53b18f0b0000 pid=2959 /usr/bin/dash guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=26b29a23-1b00-0000-d362-53b18f0b0000 pid=2959 clone guuid=f2398025-1b00-0000-d362-53b1920b0000 pid=2962 /usr/bin/rm delete-file guuid=0f96a29e-1a00-0000-d362-53b1860a0000 pid=2694->guuid=f2398025-1b00-0000-d362-53b1920b0000 pid=2962 execve 09d65e53-632c-52c6-b821-8fe0f69e747e 158.94.209.216:80 guuid=a72ad59e-1a00-0000-d362-53b1870a0000 pid=2695->09d65e53-632c-52c6-b821-8fe0f69e747e send: 80B guuid=f1c597a9-1a00-0000-d362-53b1b00a0000 pid=2736->09d65e53-632c-52c6-b821-8fe0f69e747e send: 80B guuid=c12fe1b7-1a00-0000-d362-53b1ce0a0000 pid=2766->09d65e53-632c-52c6-b821-8fe0f69e747e send: 81B guuid=51412cc6-1a00-0000-d362-53b1ea0a0000 pid=2794->09d65e53-632c-52c6-b821-8fe0f69e747e send: 81B guuid=9a1667d5-1a00-0000-d362-53b1060b0000 pid=2822->09d65e53-632c-52c6-b821-8fe0f69e747e send: 81B guuid=525434e5-1a00-0000-d362-53b1280b0000 pid=2856->09d65e53-632c-52c6-b821-8fe0f69e747e send: 81B guuid=35f7f2f4-1a00-0000-d362-53b14c0b0000 pid=2892->09d65e53-632c-52c6-b821-8fe0f69e747e send: 81B guuid=37721d06-1b00-0000-d362-53b1710b0000 pid=2929->09d65e53-632c-52c6-b821-8fe0f69e747e send: 80B guuid=6df83916-1b00-0000-d362-53b1840b0000 pid=2948->09d65e53-632c-52c6-b821-8fe0f69e747e send: 80B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-09-14 11:31:18 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d2e4d3ae1b9c5e4e28b0b6852bb66c3c05e4d439f64349aa8306744bbf613c50

(this sample)

  
Delivery method
Distributed via web download

Comments