MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dbfdf1a42137345fef628f8d1a44e4d7429d8f77d0e78ab38f51a391311cd606. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: dbfdf1a42137345fef628f8d1a44e4d7429d8f77d0e78ab38f51a391311cd606
SHA3-384 hash: 9573bfa9986ee9eda2bf6e9f326ff095dd929834abe0fef177600e6b30d7586c2cee191a5556deabdd53b42214b87bc7
SHA1 hash: a598692993194ea4a83dc008167ee24fa0c95e1c
MD5 hash: 79ba20c5f661838fd6e4c607b453f2b3
humanhash: autumn-twelve-cold-bakerloo
File name:get.sh
Download: download sample
Signature Mirai
File size:2'610 bytes
First seen:2025-05-16 16:29:19 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:vf//nfQ/ikfzxayfsnfabfXSXWc7fsKXFfHTfqrfyK9fcDfSeEfdrfDC0f8RI:vPngLNs+j+kYrKvEedW01
TLSH T1ED5152C6635395343CB29A37B6BA1A193280E09D9EC67B58BDFC3CB9528CE1C3454B47
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.135.194.43/bins/get.x866a889a1fc6489ff0adb0fa87cc61ae0a42b569e8cf89b469e725bdad760ca785 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.mips13cab87cd2580d34f0c60b31897281fc5870f1a979b8ee71683374dfe0c250e1 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.arc40f802238cd04544e52554910d665c34b0c79ecc889aa399d494812ada813580 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.i468n/an/aelf ua-wget
http://45.135.194.43/bins/get.i686n/an/aelf ua-wget
http://45.135.194.43/bins/get.x86_64n/an/aelf ua-wget
http://45.135.194.43/bins/get.mpsl3f6efeb115b2c69c73c25799395824bd428024cdcc708036eeafe23cc08096ee Miraielf mirai ua-wget
http://45.135.194.43/bins/get.arm4cd5a0b8f450bb4b1eaeabe20ed1d9ff59aae87e272998d56e73d813da5040c1 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.arm599bebadd78994cbddd0102281a400751050338ee7c6f1926f29093c966b6a0e5 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.arm67505011063ab00bcd3113fe2d7c3855d50af49a753015cd9018cbbfe65bd84db Miraielf mirai ua-wget
http://45.135.194.43/bins/get.arm7fe9a5117526681f8c5c0b73d9ebca60f64b3c534c000374b1fe3f70dbc462a27 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.ppc1225c2ed8afdb69733b59a23f77b6aa6ccd62c5f817c9da8a9c169c3aa157322 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.spcbdd6d6b9b6a5c36ed92b6781ae0132cf361eeb27d32e9539581564663dccc29c Miraielf mirai ua-wget
http://45.135.194.43/bins/get.m68kd980ea20258d480e3f0de0ec4db24a65ee3b90ee277df2098ddc201b674cf7c2 Miraielf mirai ua-wget
http://45.135.194.43/bins/get.sh41a212f5d854cd5a21239232901ff2f5783ebabc73906304644b486474de6a1b3 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
downloader agent overt
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-05-16 16:31:56 UTC
File Type:
Text (Shell)
AV detection:
17 of 24 (70.83%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:lzrd antivm botnet defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
UPX packed file
Enumerates running processes
Writes file to system bin folder
Modifies Watchdog functionality
File and Directory Permissions Modification
Executes dropped EXE
Contacts a large (657210) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh dbfdf1a42137345fef628f8d1a44e4d7429d8f77d0e78ab38f51a391311cd606

(this sample)

  
Delivery method
Distributed via web download

Comments