MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ddee0b4319ebf3755752b380b581278629b8751fa1d33bb27fbe1fa7ecfaafe8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: ddee0b4319ebf3755752b380b581278629b8751fa1d33bb27fbe1fa7ecfaafe8
SHA3-384 hash: a7642d6201c45dc659fc329c03a606a3b22078797d8908e1b31c2a0db9466251651062d27fc16264e5c5a98e8fbadcde
SHA1 hash: 3e7a65bd471d0faf05945429f73b9e0c33dbd68e
MD5 hash: db64b10fb80f1fc504a797e53b989edb
humanhash: avocado-oklahoma-ack-cola
File name:wget.sh
Download: download sample
Signature Mirai
File size:449 bytes
First seen:2025-09-01 15:04:43 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:SFkYqrsLcXFkYqivXFkYq6NIl55XFkYqSa0LKiecXFkY6IXXFkY8WT6XFkY9anIF:HVQLlViCV6NIl5wVH0LKVlUqGPcF
TLSH T1D4F0A0CD37127666880EDE02E2630AA09401EBD110A58F89F9D60CB55C9C780B4B6F4B
Magika batch
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.153.69.151/arm3e5ee85c900647af568d41076a3dc1a2600dbbd1355744895b89181ce44ca7f4 Mirai32-bit elf mirai Mozi
http://103.153.69.151/arm5f780dc09d326a38c0d712fea1243112d6148f81d323529bd726ffca0e8382805 Miraielf geofenced mirai ua-wget USA
http://103.153.69.151/arm6dd7ef996397753a979ec93c81eb09ebb653a52311fad9d277a2c6bada7045b18 Miraielf geofenced mirai ua-wget USA
http://103.153.69.151/arm78499db38a52efc4646eb70e5b1a1e6c4cdea4c4811bd255559303cc002ac3593 Miraielf geofenced mirai ua-wget USA
http://103.153.69.151/mips9bad584a9bcc3747c703d637720558a9f6389c636f7515c8e6cce8d31a91a8a2 Mirai32-bit elf mirai Mozi
http://103.153.69.151/mpsla974b7de7fff143231cceb4336d022192096f814e7512a7d246fef7235ccb606 Miraielf geofenced mips mirai ua-wget USA
http://103.153.69.151/x8656fb720aa04bb923a80712cd690510c2c532e5cc3fe0e32868eb4097cc3132bf Mirai32-bit elf mirai Mozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-08-31T14:58:00Z UTC
Last seen:
2025-08-31T14:58:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=ffac6dc0-1600-0000-c410-63767e0c0000 pid=3198 /usr/bin/sudo guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202 /tmp/sample.bin guuid=ffac6dc0-1600-0000-c410-63767e0c0000 pid=3198->guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202 execve guuid=5389b1c2-1600-0000-c410-6376840c0000 pid=3204 /usr/bin/wget net send-data write-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=5389b1c2-1600-0000-c410-6376840c0000 pid=3204 execve guuid=91274d45-1700-0000-c410-6376610d0000 pid=3425 /usr/bin/chmod guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=91274d45-1700-0000-c410-6376610d0000 pid=3425 execve guuid=8fd3b545-1700-0000-c410-6376630d0000 pid=3427 /usr/bin/dash guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=8fd3b545-1700-0000-c410-6376630d0000 pid=3427 clone guuid=0524e046-1700-0000-c410-6376670d0000 pid=3431 /usr/bin/wget net send-data write-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=0524e046-1700-0000-c410-6376670d0000 pid=3431 execve guuid=fd5c308d-1700-0000-c410-6376d80d0000 pid=3544 /usr/bin/chmod guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=fd5c308d-1700-0000-c410-6376d80d0000 pid=3544 execve guuid=0475a58d-1700-0000-c410-6376da0d0000 pid=3546 /usr/bin/dash guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=0475a58d-1700-0000-c410-6376da0d0000 pid=3546 clone guuid=68f2998e-1700-0000-c410-6376de0d0000 pid=3550 /usr/bin/wget net send-data write-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=68f2998e-1700-0000-c410-6376de0d0000 pid=3550 execve guuid=aafead11-1800-0000-c410-6376ed0e0000 pid=3821 /usr/bin/chmod guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=aafead11-1800-0000-c410-6376ed0e0000 pid=3821 execve guuid=d9903612-1800-0000-c410-6376ee0e0000 pid=3822 /usr/bin/dash guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=d9903612-1800-0000-c410-6376ee0e0000 pid=3822 clone guuid=ffb75c14-1800-0000-c410-6376f40e0000 pid=3828 /usr/bin/wget net send-data write-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=ffb75c14-1800-0000-c410-6376f40e0000 pid=3828 execve guuid=62168c55-1800-0000-c410-6376840f0000 pid=3972 /usr/bin/chmod guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=62168c55-1800-0000-c410-6376840f0000 pid=3972 execve guuid=cbb60956-1800-0000-c410-6376860f0000 pid=3974 /usr/bin/dash guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=cbb60956-1800-0000-c410-6376860f0000 pid=3974 clone guuid=b357d056-1800-0000-c410-63768a0f0000 pid=3978 /usr/bin/wget net send-data write-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=b357d056-1800-0000-c410-63768a0f0000 pid=3978 execve guuid=917d9aab-1800-0000-c410-63764b100000 pid=4171 /usr/bin/chmod guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=917d9aab-1800-0000-c410-63764b100000 pid=4171 execve guuid=2f450cac-1800-0000-c410-63764e100000 pid=4174 /usr/bin/dash guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=2f450cac-1800-0000-c410-63764e100000 pid=4174 clone guuid=ef6cf4ac-1800-0000-c410-637654100000 pid=4180 /usr/bin/wget net send-data write-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=ef6cf4ac-1800-0000-c410-637654100000 pid=4180 execve guuid=a705fbef-1800-0000-c410-6376f8100000 pid=4344 /usr/bin/chmod guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=a705fbef-1800-0000-c410-6376f8100000 pid=4344 execve guuid=9c4970f0-1800-0000-c410-6376fb100000 pid=4347 /usr/bin/dash guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=9c4970f0-1800-0000-c410-6376fb100000 pid=4347 clone guuid=1ca447f1-1800-0000-c410-637600110000 pid=4352 /usr/bin/wget net send-data write-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=1ca447f1-1800-0000-c410-637600110000 pid=4352 execve guuid=196c2a37-1900-0000-c410-63769f110000 pid=4511 /usr/bin/chmod guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=196c2a37-1900-0000-c410-63769f110000 pid=4511 execve guuid=edbdb037-1900-0000-c410-6376a1110000 pid=4513 /home/sandbox/x86 guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=edbdb037-1900-0000-c410-6376a1110000 pid=4513 execve guuid=b0f08f39-1900-0000-c410-6376aa110000 pid=4522 /usr/bin/rm delete-file guuid=f82974c2-1600-0000-c410-6376820c0000 pid=3202->guuid=b0f08f39-1900-0000-c410-6376aa110000 pid=4522 execve 4a11bae5-96b9-5d35-a72a-4e49f7748dce 103.153.69.151:80 guuid=5389b1c2-1600-0000-c410-6376840c0000 pid=3204->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 132B guuid=0524e046-1700-0000-c410-6376670d0000 pid=3431->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 133B guuid=68f2998e-1700-0000-c410-6376de0d0000 pid=3550->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 133B guuid=ffb75c14-1800-0000-c410-6376f40e0000 pid=3828->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 133B guuid=b357d056-1800-0000-c410-63768a0f0000 pid=3978->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 133B guuid=ef6cf4ac-1800-0000-c410-637654100000 pid=4180->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 133B guuid=1ca447f1-1800-0000-c410-637600110000 pid=4352->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 132B guuid=c0cfdf37-1900-0000-c410-6376a2110000 pid=4514 /home/sandbox/ guuid=edbdb037-1900-0000-c410-6376a1110000 pid=4513->guuid=c0cfdf37-1900-0000-c410-6376a2110000 pid=4514 clone guuid=484b7a39-1900-0000-c410-6376a6110000 pid=4518 /home/sandbox/ guuid=edbdb037-1900-0000-c410-6376a1110000 pid=4513->guuid=484b7a39-1900-0000-c410-6376a6110000 pid=4518 clone guuid=b8a27e39-1900-0000-c410-6376a7110000 pid=4519 /home/sandbox/ zombie guuid=edbdb037-1900-0000-c410-6376a1110000 pid=4513->guuid=b8a27e39-1900-0000-c410-6376a7110000 pid=4519 clone guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520 /home/sandbox/ net send-data zombie guuid=edbdb037-1900-0000-c410-6376a1110000 pid=4513->guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520 clone 8dc3cbf0-e657-54a9-b6da-3abe058dcf2a 5.161.109.23:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->8dc3cbf0-e657-54a9-b6da-3abe058dcf2a send: 26B 28064cf3-1023-5341-8222-1d2ca68f2c33 152.53.15.127:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->28064cf3-1023-5341-8222-1d2ca68f2c33 send: 78B c0b60401-2787-5e57-85f9-7652823a4a8e 70.34.254.19:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->c0b60401-2787-5e57-85f9-7652823a4a8e send: 26B 5a1eed8a-85fe-5cc9-b13b-21dc70289ae4 0.0.0.0:0 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->5a1eed8a-85fe-5cc9-b13b-21dc70289ae4 con a7cd0bd1-5b44-573f-8ca4-bf2acb8b2248 217.160.70.42:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->a7cd0bd1-5b44-573f-8ca4-bf2acb8b2248 send: 26B 2e1ca1bf-8e0e-51bd-a149-55d596118774 139.84.165.176:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->2e1ca1bf-8e0e-51bd-a149-55d596118774 send: 26B ac0b4284-2aa4-5c89-80a0-995c690355af 81.169.136.222:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->ac0b4284-2aa4-5c89-80a0-995c690355af send: 26B 1953617f-bd2b-56a9-9ede-0bea1c944f64 178.254.22.166:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->1953617f-bd2b-56a9-9ede-0bea1c944f64 send: 52B 69e3eade-acae-5a5a-b527-3b224017b69e 168.235.111.72:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->69e3eade-acae-5a5a-b527-3b224017b69e send: 26B afe192fb-736d-5df2-ad22-9276ad1588e5 202.61.197.122:53 guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->afe192fb-736d-5df2-ad22-9276ad1588e5 send: 26B guuid=9be19539-1900-0000-c410-6376ab110000 pid=4523 /home/sandbox/ net net-scan send-data guuid=b4948239-1900-0000-c410-6376a8110000 pid=4520->guuid=9be19539-1900-0000-c410-6376ab110000 pid=4523 clone 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=9be19539-1900-0000-c410-6376ab110000 pid=4523->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con b8f37d50-e2f6-519d-938e-7debe68aa0e9 156.54.0.113:37215 guuid=9be19539-1900-0000-c410-6376ab110000 pid=4523->b8f37d50-e2f6-519d-938e-7debe68aa0e9 send: 40B guuid=9be19539-1900-0000-c410-6376ab110000 pid=4523|send-data send-data to 4097 IP addresses review logs to see them all guuid=9be19539-1900-0000-c410-6376ab110000 pid=4523->guuid=9be19539-1900-0000-c410-6376ab110000 pid=4523|send-data send
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-08-31 20:43:44 UTC
File Type:
Text (Shell)
AV detection:
12 of 36 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh ddee0b4319ebf3755752b380b581278629b8751fa1d33bb27fbe1fa7ecfaafe8

(this sample)

  
Delivery method
Distributed via web download

Comments