MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df688e5930ad7993f3b5501fcb3edcf964239e345dd9a58eed72bb579e3eb07c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: df688e5930ad7993f3b5501fcb3edcf964239e345dd9a58eed72bb579e3eb07c
SHA3-384 hash: aa005682f2fd5e08db4490016c2f7ae87335f0766341aaa86f19526fa74b950664bd8a4eb7dc18420566235a561037d4
SHA1 hash: 43705534196eae404ca0f43b017993c7d83e1e3d
MD5 hash: fdc177c008c23440e316fc5423d66461
humanhash: blossom-tango-fanta-carbon
File name:logic.sh
Download: download sample
Signature Mirai
File size:2'052 bytes
First seen:2026-01-03 18:32:36 UTC
Last seen:2026-01-06 16:15:04 UTC
File type: sh
MIME type:text/plain
ssdeep 48:WVThJWVjNJQJrmz9AjUZr75ySAGJGOWC9Q58oqk7hqGqPn2:WVThUVjN6JKzijUp75ySAGlB9Q5zrhZB
TLSH T1154195CF053E39154EC7CF1F73F646CA5195E2E1A1838FF5684C043A9889898B99DDA8
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.241.10/x86_64.kok47e1b67862e668c9398b010a3b0d49dfce4162795b5db6219318cef9ba5fcc60 Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/x86_32.kok03d7a243a18f053113e199837d74324b063c744679e681dde068d129d109af9f Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/x86_64.kokz78e260a5118578e0b4d1a55374c217c218c48ab8f7455dd5a28a70746f99f715 Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/x86_32.kokz03d7a243a18f053113e199837d74324b063c744679e681dde068d129d109af9f Miraielf geofenced mirai ua-wget USA x86
http://91.92.241.10/powerpc.kok7570d065c824764a1a3a6c65496685bfc83eff811cc1345ccb7273141950cb46 Miraielf geofenced mirai PowerPC ua-wget USA
http://91.92.241.10/mips.kokdf84c58145c759e99c74fed1570dbf9089dfb200669fb911f4d60f307ef63648 Miraielf geofenced mips mirai ua-wget USA
http://91.92.241.10/mipsel.kok0dda6b17b27256450669bcad31164fa1e389864a15b329fa43735402534990c1 Miraielf geofenced mips mirai ua-wget USA
http://91.92.241.10/arm.kokf762c3e51a32e4e93fd41fe3be4eac71606d84cc1372f5e100bff5b35241e74f Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm5.kokff4abf773e3047ea1a94dbb4d2a7032a9dccc7a396cad04511d991c66dc37448 Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm6.kok6ae6ed76ac1b59475676b279f542a724967a0a91c61aa76cb9e2d307b1e26fa7 Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/arm7.kok4db331198b2aadcb90aadfbb9f68c033e08eea1eacb3020cd45eaa407bc4c1dc Miraiarm elf geofenced mirai ua-wget USA
http://91.92.241.10/sparc.kokn/an/aelf ua-wget
http://91.92.241.10/m68k.kokn/an/aelf ua-wget
http://91.92.241.10/sh4.kokn/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
42
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2026-01-03T18:07:00Z UTC
Last seen:
2026-01-04T01:46:00Z UTC
Hits:
~10
Threat name:
Linux.Trojan.Geninst
Status:
Malicious
First seen:
2026-01-03 19:21:29 UTC
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh df688e5930ad7993f3b5501fcb3edcf964239e345dd9a58eed72bb579e3eb07c

(this sample)

  
Delivery method
Distributed via web download

Comments