MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d38c1df45304f7eeae94d436ba660601251cacd112c2e375f0f97e91d6c3c4be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: d38c1df45304f7eeae94d436ba660601251cacd112c2e375f0f97e91d6c3c4be
SHA3-384 hash: 0ef6a42ee1d1d621daa8f69d9ebda71a45c58ee96756087bcc495ecd392d46db4104e5cb2f9b5e5769a87a6f28ce37ac
SHA1 hash: b94ffb8a1d3eeac012ec792e68009edb07233dc8
MD5 hash: 10516069bc241c566e2a812112a3844c
humanhash: wisconsin-alaska-alanine-michigan
File name:check.sh
Download: download sample
Signature Mirai
File size:1'577 bytes
First seen:2026-02-27 01:26:34 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:VUeYj+H13UbXDMK9CFdYhEnHQ6Yl60mOD+nl72tg2UbrIJLHg9I5TUb7UbrRLQZl:VUeYj+H1CDMK9CnYhEK0U+Eg+yjSu
TLSH T16731AD9246227E7C3CC661D9F1AA4095B045825F15FB6F7474C9AEF91B0D040F268FB5
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.208.159.67/check.shd38c1df45304f7eeae94d436ba660601251cacd112c2e375f0f97e91d6c3c4be Miraimirai sh ua-wget
http://185.208.159.67/syst3mddcf343df280816c4856ee164b9b4b14906a09b1fd4bfab604ee9370529ed61d1 Miraielf miner mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash lolbin
Result
Gathering data
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-27 01:27:22 UTC
File Type:
Text (Shell)
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Result
Malware family:
xmrig_linux
Score:
  10/10
Tags:
family:xmrig family:xmrig_linux antivm defense_evasion discovery execution linux miner persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Checks CPU configuration
Reads CPU attributes
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Deletes log files
Enumerates running processes
Reads hardware information
File and Directory Permissions Modification
Indicator Removal: Clear Command History
Executes dropped EXE
XMRig Miner payload
Xmrig family
Xmrig_linux family
xmrig
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d38c1df45304f7eeae94d436ba660601251cacd112c2e375f0f97e91d6c3c4be

(this sample)

  
Delivery method
Distributed via web download

Comments