MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d7bf2bf9d9a61ef0e4792eb752736918f79f9874c8888544f99ec7e61c824485. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: d7bf2bf9d9a61ef0e4792eb752736918f79f9874c8888544f99ec7e61c824485
SHA3-384 hash: cd9465e6df96bf4165f7a0c472b2f26238a46f333b2ab5b8b8f9a43dcdf1f7003513928a0902189cce7816fe81627890
SHA1 hash: 0c49d7417a09f65d02ebc3ac17bebad22f9309af
MD5 hash: 71909e32fb8e27e61d07d85c9d1e4c43
humanhash: comet-glucose-angel-bluebird
File name:sdt
Download: download sample
Signature Mirai
File size:1'000 bytes
First seen:2025-06-25 19:11:52 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:i4FvEU/eIbr5zOt+MB0h1Z1WktU7ktZpZmkt1ikP:i4FEU/rr5CEA07ZkkYkakakP
TLSH T14B1189CF665188A0CC665DD836524819F04ED3D43ACB8DCCB1CEC026E59ED047512F59
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/mipsn/an/aelf gafgyt mirai ua-wget
http://158.51.126.131/mipsel68b7a90ca3d6b4034d4428ee1483178d9a69171090087523ecd8d2314aa60603 Miraielf gafgyt mirai ua-wget
http://158.51.126.131/armv5l506a3e39a46d0e6d13ba89dd5a6fe2aa81c5122db15742d4ce509a3c0738ff01 Miraielf gafgyt mirai ua-wget
http://158.51.126.131/armv7l69c12ce6f569adfaa217f1ebd365b727e3d2f882f22ef10169c8dc7ad3a05f4e Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=2ab50b17-1900-0000-3555-2b31e5130000 pid=5093 /usr/bin/sudo guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102 /tmp/sample.bin guuid=2ab50b17-1900-0000-3555-2b31e5130000 pid=5093->guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102 execve guuid=44397619-1900-0000-3555-2b31f0130000 pid=5104 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=44397619-1900-0000-3555-2b31f0130000 pid=5104 clone guuid=664c6e1a-1900-0000-3555-2b31fa130000 pid=5114 /usr/bin/rm delete-file guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=664c6e1a-1900-0000-3555-2b31fa130000 pid=5114 execve guuid=22e5ab1a-1900-0000-3555-2b31fb130000 pid=5115 /usr/bin/rm delete-file guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=22e5ab1a-1900-0000-3555-2b31fb130000 pid=5115 execve guuid=09a8e51a-1900-0000-3555-2b31fd130000 pid=5117 /usr/bin/rm delete-file guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=09a8e51a-1900-0000-3555-2b31fd130000 pid=5117 execve guuid=915f201b-1900-0000-3555-2b31ff130000 pid=5119 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=915f201b-1900-0000-3555-2b31ff130000 pid=5119 clone guuid=5d0d8b1b-1900-0000-3555-2b3103140000 pid=5123 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=5d0d8b1b-1900-0000-3555-2b3103140000 pid=5123 clone guuid=0ee4d31b-1900-0000-3555-2b3106140000 pid=5126 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=0ee4d31b-1900-0000-3555-2b3106140000 pid=5126 clone guuid=48d02e46-1900-0000-3555-2b3164140000 pid=5220 /usr/bin/chmod guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=48d02e46-1900-0000-3555-2b3164140000 pid=5220 execve guuid=073a7746-1900-0000-3555-2b3165140000 pid=5221 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=073a7746-1900-0000-3555-2b3165140000 pid=5221 clone guuid=84a36b47-1900-0000-3555-2b3167140000 pid=5223 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=84a36b47-1900-0000-3555-2b3167140000 pid=5223 clone guuid=0d96af72-1900-0000-3555-2b3174140000 pid=5236 /usr/bin/chmod guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=0d96af72-1900-0000-3555-2b3174140000 pid=5236 execve guuid=d4c7f372-1900-0000-3555-2b3175140000 pid=5237 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=d4c7f372-1900-0000-3555-2b3175140000 pid=5237 clone guuid=44cf4b74-1900-0000-3555-2b3177140000 pid=5239 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=44cf4b74-1900-0000-3555-2b3177140000 pid=5239 clone guuid=10eddaa0-1900-0000-3555-2b3179140000 pid=5241 /usr/bin/chmod guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=10eddaa0-1900-0000-3555-2b3179140000 pid=5241 execve guuid=985681a1-1900-0000-3555-2b317a140000 pid=5242 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=985681a1-1900-0000-3555-2b317a140000 pid=5242 clone guuid=d86213a3-1900-0000-3555-2b317c140000 pid=5244 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=d86213a3-1900-0000-3555-2b317c140000 pid=5244 clone guuid=cc3722cf-1900-0000-3555-2b317e140000 pid=5246 /usr/bin/chmod guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=cc3722cf-1900-0000-3555-2b317e140000 pid=5246 execve guuid=7795d8cf-1900-0000-3555-2b317f140000 pid=5247 /usr/bin/dash guuid=ed673719-1900-0000-3555-2b31ee130000 pid=5102->guuid=7795d8cf-1900-0000-3555-2b317f140000 pid=5247 clone guuid=f87a7f19-1900-0000-3555-2b31f1130000 pid=5105 /usr/bin/cat guuid=44397619-1900-0000-3555-2b31f0130000 pid=5104->guuid=f87a7f19-1900-0000-3555-2b31f1130000 pid=5105 execve guuid=7c918519-1900-0000-3555-2b31f2130000 pid=5106 /usr/bin/grep guuid=44397619-1900-0000-3555-2b31f0130000 pid=5104->guuid=7c918519-1900-0000-3555-2b31f2130000 pid=5106 execve guuid=28d18a19-1900-0000-3555-2b31f3130000 pid=5107 /usr/bin/grep guuid=44397619-1900-0000-3555-2b31f0130000 pid=5104->guuid=28d18a19-1900-0000-3555-2b31f3130000 pid=5107 execve guuid=e0d98e19-1900-0000-3555-2b31f4130000 pid=5108 /usr/bin/grep guuid=44397619-1900-0000-3555-2b31f0130000 pid=5104->guuid=e0d98e19-1900-0000-3555-2b31f4130000 pid=5108 execve guuid=48749319-1900-0000-3555-2b31f5130000 pid=5109 /usr/bin/cut guuid=44397619-1900-0000-3555-2b31f0130000 pid=5104->guuid=48749319-1900-0000-3555-2b31f5130000 pid=5109 execve guuid=1207271b-1900-0000-3555-2b3100140000 pid=5120 /usr/bin/cp write-file guuid=915f201b-1900-0000-3555-2b31ff130000 pid=5119->guuid=1207271b-1900-0000-3555-2b3100140000 pid=5120 execve guuid=35f5911b-1900-0000-3555-2b3104140000 pid=5124 /usr/bin/chmod guuid=5d0d8b1b-1900-0000-3555-2b3103140000 pid=5123->guuid=35f5911b-1900-0000-3555-2b3104140000 pid=5124 execve guuid=e7a1de1b-1900-0000-3555-2b3107140000 pid=5127 /usr/bin/wget net send-data write-file guuid=0ee4d31b-1900-0000-3555-2b3106140000 pid=5126->guuid=e7a1de1b-1900-0000-3555-2b3107140000 pid=5127 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=e7a1de1b-1900-0000-3555-2b3107140000 pid=5127->2beca644-24da-5e18-bc49-c06b8c4a111d send: 133B guuid=95917a47-1900-0000-3555-2b3168140000 pid=5224 /usr/bin/wget net send-data write-file guuid=84a36b47-1900-0000-3555-2b3167140000 pid=5223->guuid=95917a47-1900-0000-3555-2b3168140000 pid=5224 execve guuid=95917a47-1900-0000-3555-2b3168140000 pid=5224->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=c3536074-1900-0000-3555-2b3178140000 pid=5240 /usr/bin/wget net send-data write-file guuid=44cf4b74-1900-0000-3555-2b3177140000 pid=5239->guuid=c3536074-1900-0000-3555-2b3178140000 pid=5240 execve guuid=c3536074-1900-0000-3555-2b3178140000 pid=5240->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=3aaf29a3-1900-0000-3555-2b317d140000 pid=5245 /usr/bin/wget net send-data write-file guuid=d86213a3-1900-0000-3555-2b317c140000 pid=5244->guuid=3aaf29a3-1900-0000-3555-2b317d140000 pid=5245 execve guuid=3aaf29a3-1900-0000-3555-2b317d140000 pid=5245->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-06-25 20:10:53 UTC
File Type:
Text (Shell)
AV detection:
9 of 38 (23.68%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh d7bf2bf9d9a61ef0e4792eb752736918f79f9874c8888544f99ec7e61c824485

(this sample)

  
Delivery method
Distributed via web download

Comments