MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d5b6eeac3f9ad2d7bf934fd5111c8b6be7eecf7166f114a5cbed451f8d3bf6ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: d5b6eeac3f9ad2d7bf934fd5111c8b6be7eecf7166f114a5cbed451f8d3bf6ca
SHA3-384 hash: 807f4545facc0daaf66b58a81bc739408b5ffc869498a0804be75ad0e5afbf37c74fcbcc348690779e86d747d7efcb42
SHA1 hash: 2ea3a67b3abedff53bbfe725f1a23d08084329cd
MD5 hash: 49a2acb38448a49eba300401d7fb96b7
humanhash: maine-hawaii-monkey-winner
File name:kraxe
Download: download sample
Signature Mirai
File size:465 bytes
First seen:2025-12-21 15:14:21 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:ep8hepzk5pSqAp99IKAepFNIxOipW+sKGv:ep8hepzk5pSfp99IypFNIxJpZsKGv
TLSH T179F08C9F18273512C958BC7023AB389D7840CE8A2A314F6EECD7803784CCA007F6CE64
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/nklmips92b3f4809cec67c5cc4577aadc03b9de1fffc4970c02d8301c5af51f473e1e01 Miraielf mirai ua-wget
http://130.12.180.64/nklmpsl2d115365628417f4ddcd8d23170d1b24ce6882af1e8ac53afb73ae697cfe7c99 Miraielf mirai ua-wget
http://130.12.180.64/nklarme4f07f4bf16ff622e0748f9ef128d2f4621e950ec8e5a588540614eb5cbf3e26 Miraielf mirai ua-wget
http://130.12.180.64/nklarm531216b42b249f94190e120621b9dc8ccbab159d06cb96db4a3a9d0f640126e63 Miraielf mirai ua-wget
http://130.12.180.64/nklarm6e7928719939bdf0b41bb0cef044e3cf6bc2ad9ea7b873e0a8987c127da0bb46d Miraielf mirai ua-wget
http://130.12.180.64/nklarm7c554c5456bee1a6b6f08ab86ad2c3864a728dec2b047e67fe5568e966fd966fd Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-22T17:04:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=7ebe0ce8-1b00-0000-4c89-cb36e7080000 pid=2279 /usr/bin/sudo guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289 /tmp/sample.bin guuid=7ebe0ce8-1b00-0000-4c89-cb36e7080000 pid=2279->guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289 execve guuid=bcafafec-1b00-0000-4c89-cb36f3080000 pid=2291 /usr/bin/wget net send-data write-file guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=bcafafec-1b00-0000-4c89-cb36f3080000 pid=2291 execve guuid=214ff4f4-1b00-0000-4c89-cb3604090000 pid=2308 /usr/bin/chmod guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=214ff4f4-1b00-0000-4c89-cb3604090000 pid=2308 execve guuid=f97547f5-1b00-0000-4c89-cb3605090000 pid=2309 /usr/bin/dash guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=f97547f5-1b00-0000-4c89-cb3605090000 pid=2309 clone guuid=16f27cf6-1b00-0000-4c89-cb3608090000 pid=2312 /usr/bin/wget net send-data write-file guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=16f27cf6-1b00-0000-4c89-cb3608090000 pid=2312 execve guuid=4de6dafa-1b00-0000-4c89-cb3613090000 pid=2323 /usr/bin/chmod guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=4de6dafa-1b00-0000-4c89-cb3613090000 pid=2323 execve guuid=2c921efb-1b00-0000-4c89-cb3614090000 pid=2324 /usr/bin/dash guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=2c921efb-1b00-0000-4c89-cb3614090000 pid=2324 clone guuid=80e8cdfb-1b00-0000-4c89-cb3617090000 pid=2327 /usr/bin/wget net send-data write-file guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=80e8cdfb-1b00-0000-4c89-cb3617090000 pid=2327 execve guuid=70b28cff-1b00-0000-4c89-cb361f090000 pid=2335 /usr/bin/chmod guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=70b28cff-1b00-0000-4c89-cb361f090000 pid=2335 execve guuid=aa0be4ff-1b00-0000-4c89-cb3621090000 pid=2337 /usr/bin/dash guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=aa0be4ff-1b00-0000-4c89-cb3621090000 pid=2337 clone guuid=4302ac00-1c00-0000-4c89-cb3625090000 pid=2341 /usr/bin/wget net send-data write-file guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=4302ac00-1c00-0000-4c89-cb3625090000 pid=2341 execve guuid=e6529004-1c00-0000-4c89-cb3631090000 pid=2353 /usr/bin/chmod guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=e6529004-1c00-0000-4c89-cb3631090000 pid=2353 execve guuid=c4c7e504-1c00-0000-4c89-cb3633090000 pid=2355 /usr/bin/dash guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=c4c7e504-1c00-0000-4c89-cb3633090000 pid=2355 clone guuid=d268a105-1c00-0000-4c89-cb3637090000 pid=2359 /usr/bin/wget net send-data write-file guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=d268a105-1c00-0000-4c89-cb3637090000 pid=2359 execve guuid=0ce41c0a-1c00-0000-4c89-cb3641090000 pid=2369 /usr/bin/chmod guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=0ce41c0a-1c00-0000-4c89-cb3641090000 pid=2369 execve guuid=29e0550a-1c00-0000-4c89-cb3642090000 pid=2370 /usr/bin/dash guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=29e0550a-1c00-0000-4c89-cb3642090000 pid=2370 clone guuid=7b10e40a-1c00-0000-4c89-cb3645090000 pid=2373 /usr/bin/wget net send-data write-file guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=7b10e40a-1c00-0000-4c89-cb3645090000 pid=2373 execve guuid=80115f0f-1c00-0000-4c89-cb3652090000 pid=2386 /usr/bin/chmod guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=80115f0f-1c00-0000-4c89-cb3652090000 pid=2386 execve guuid=6341ad0f-1c00-0000-4c89-cb3653090000 pid=2387 /usr/bin/dash guuid=9fa55fec-1b00-0000-4c89-cb36f1080000 pid=2289->guuid=6341ad0f-1c00-0000-4c89-cb3653090000 pid=2387 clone f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=bcafafec-1b00-0000-4c89-cb36f3080000 pid=2291->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=16f27cf6-1b00-0000-4c89-cb3608090000 pid=2312->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=80e8cdfb-1b00-0000-4c89-cb3617090000 pid=2327->f22fee75-ab34-540d-95fe-696883c6f4ad send: 134B guuid=4302ac00-1c00-0000-4c89-cb3625090000 pid=2341->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=d268a105-1c00-0000-4c89-cb3637090000 pid=2359->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B guuid=7b10e40a-1c00-0000-4c89-cb3645090000 pid=2373->f22fee75-ab34-540d-95fe-696883c6f4ad send: 135B
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:35:29 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d5b6eeac3f9ad2d7bf934fd5111c8b6be7eecf7166f114a5cbed451f8d3bf6ca

(this sample)

  
Delivery method
Distributed via web download

Comments