MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d752722edb1ffe46a0015d4de4f03bd245bf64b2d41b1a702a057e4661d3e8ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: d752722edb1ffe46a0015d4de4f03bd245bf64b2d41b1a702a057e4661d3e8ee
SHA3-384 hash: 0866cd337a561aab418b7146cf25601057e812b79f8af04020cc7dd8e34e5d9d0e6267839fd1eb51078e1de44ab6490d
SHA1 hash: 6732ca87a228e1f8ec423e25151f8ce5e765470a
MD5 hash: 5ee059cc4ce118aeee078ca972d43bdc
humanhash: orange-four-michigan-oklahoma
File name:dvr.sh
Download: download sample
Signature Mirai
File size:1'159 bytes
First seen:2025-07-20 17:43:11 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:ohBh9Mk8QoWLptV5+/I/V7ITa2n292o2+2vc2GSQ:ohL8QoWPV5+wV7IuG2FjYcYQ
TLSH T126217C9AD540E970B9CA50157287DB5ED5B993E80D830C60EC5AF6B4BD8C86CF012D59
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.133.58/skid.arm4c72b3a3e372704eb64e1f0e9ebd021902928fa8c6df47e15a347fa682d48916 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm5495ce809e735ffcdf61aee835d0dc9201ef56aa045252cfa3e7029aac8a0b891 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm7cac1f84aafd6f3b5d144e2bdad81f759d12515d73fac77cb8ac09678f2c28f52 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
22
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=8f738aa1-1a00-0000-d900-11d5710a0000 pid=2673 /usr/bin/sudo guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679 /tmp/sample.bin guuid=8f738aa1-1a00-0000-d900-11d5710a0000 pid=2673->guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679 execve guuid=bdfeddac-1a00-0000-d900-11d5910a0000 pid=2705 /usr/bin/rm guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=bdfeddac-1a00-0000-d900-11d5910a0000 pid=2705 execve guuid=418065ad-1a00-0000-d900-11d5930a0000 pid=2707 /usr/bin/wget net send-data write-file guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=418065ad-1a00-0000-d900-11d5930a0000 pid=2707 execve guuid=4d3ba9b0-1a00-0000-d900-11d59c0a0000 pid=2716 /usr/bin/chmod guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=4d3ba9b0-1a00-0000-d900-11d59c0a0000 pid=2716 execve guuid=92fbdfb0-1a00-0000-d900-11d59e0a0000 pid=2718 /usr/bin/dash guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=92fbdfb0-1a00-0000-d900-11d59e0a0000 pid=2718 clone guuid=8a366cb1-1a00-0000-d900-11d5a20a0000 pid=2722 /usr/bin/rm guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=8a366cb1-1a00-0000-d900-11d5a20a0000 pid=2722 execve guuid=864da2b1-1a00-0000-d900-11d5a40a0000 pid=2724 /usr/bin/wget net send-data write-file guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=864da2b1-1a00-0000-d900-11d5a40a0000 pid=2724 execve guuid=5400d5b3-1a00-0000-d900-11d5aa0a0000 pid=2730 /usr/bin/chmod guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=5400d5b3-1a00-0000-d900-11d5aa0a0000 pid=2730 execve guuid=46a80db4-1a00-0000-d900-11d5ab0a0000 pid=2731 /usr/bin/dash guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=46a80db4-1a00-0000-d900-11d5ab0a0000 pid=2731 clone guuid=201299b4-1a00-0000-d900-11d5ae0a0000 pid=2734 /usr/bin/rm guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=201299b4-1a00-0000-d900-11d5ae0a0000 pid=2734 execve guuid=5067e8b4-1a00-0000-d900-11d5b10a0000 pid=2737 /usr/bin/wget net send-data write-file guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=5067e8b4-1a00-0000-d900-11d5b10a0000 pid=2737 execve guuid=b89917b8-1a00-0000-d900-11d5b80a0000 pid=2744 /usr/bin/chmod guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=b89917b8-1a00-0000-d900-11d5b80a0000 pid=2744 execve guuid=31785eb8-1a00-0000-d900-11d5ba0a0000 pid=2746 /usr/bin/dash guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=31785eb8-1a00-0000-d900-11d5ba0a0000 pid=2746 clone guuid=695e0dba-1a00-0000-d900-11d5c00a0000 pid=2752 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=695e0dba-1a00-0000-d900-11d5c00a0000 pid=2752 execve guuid=bff951ba-1a00-0000-d900-11d5c10a0000 pid=2753 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=bff951ba-1a00-0000-d900-11d5c10a0000 pid=2753 execve guuid=f17879ba-1a00-0000-d900-11d5c20a0000 pid=2754 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=f17879ba-1a00-0000-d900-11d5c20a0000 pid=2754 execve guuid=844eb0ba-1a00-0000-d900-11d5c30a0000 pid=2755 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=844eb0ba-1a00-0000-d900-11d5c30a0000 pid=2755 execve guuid=eb47e3ba-1a00-0000-d900-11d5c40a0000 pid=2756 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=eb47e3ba-1a00-0000-d900-11d5c40a0000 pid=2756 execve guuid=3add15bb-1a00-0000-d900-11d5c60a0000 pid=2758 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=3add15bb-1a00-0000-d900-11d5c60a0000 pid=2758 execve guuid=0c075abb-1a00-0000-d900-11d5c70a0000 pid=2759 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=0c075abb-1a00-0000-d900-11d5c70a0000 pid=2759 execve guuid=984790bb-1a00-0000-d900-11d5c90a0000 pid=2761 /usr/bin/busybox guuid=e2fc9aa3-1a00-0000-d900-11d5770a0000 pid=2679->guuid=984790bb-1a00-0000-d900-11d5c90a0000 pid=2761 execve a6b092b1-7e1c-56ee-bf44-eccdde92b493 154.205.133.58:80 guuid=418065ad-1a00-0000-d900-11d5930a0000 pid=2707->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 137B guuid=864da2b1-1a00-0000-d900-11d5a40a0000 pid=2724->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 138B guuid=5067e8b4-1a00-0000-d900-11d5b10a0000 pid=2737->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 138B
Verdict:
Malicious
Threat:
HEUR:Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-07-20 17:43:29 UTC
File Type:
Text (Shell)
AV detection:
10 of 23 (43.48%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d752722edb1ffe46a0015d4de4f03bd245bf64b2d41b1a702a057e4661d3e8ee

(this sample)

  
Delivery method
Distributed via web download

Comments