MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e00296a2d0fc5ebfb13b01165f47bc138d6ad4148ed2241c1b85b1ab1e5ae97e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: e00296a2d0fc5ebfb13b01165f47bc138d6ad4148ed2241c1b85b1ab1e5ae97e
SHA3-384 hash: f2fdb13b3e1ac888d396db6e86ae833de4f203c721a7135812c087d8b42a0efae3343c6cfb2d8e0e7877acac1dc7c5e3
SHA1 hash: 9f34f5efd4ae191c8953e86367696dba061a8b6b
MD5 hash: f650ab1a2af7f336a79164d235fc1cca
humanhash: bulldog-colorado-fifteen-grey
File name:run.sh
Download: download sample
Signature Mirai
File size:243 bytes
First seen:2025-12-31 08:06:35 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:JQzHR4RzOnFflE0FnbHLUAx8e8i9bHLUAx8eGHx80dbx8v:JCkp0F7LtZtLt6ZNx+
TLSH T19FD0A5C451DFB570DF97651F7379024D114011E3FC87DA4178D415DCC21DFA56511301
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.231.222.195/bins/debug.mips4f91389b9944ca9b41072e1b1d5bdb8745c0892f2c46f161d79bb1d082b87b51 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash busybox evasive lolbin
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-31T05:15:00Z UTC
Last seen:
2025-12-31T05:35:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=57ffe1f6-1800-0000-cb86-5562fb130000 pid=5115 /usr/bin/sudo guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116 /tmp/sample.bin guuid=57ffe1f6-1800-0000-cb86-5562fb130000 pid=5115->guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116 execve guuid=36bf44f9-1800-0000-cb86-5562fd130000 pid=5117 /usr/bin/cp guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116->guuid=36bf44f9-1800-0000-cb86-5562fd130000 pid=5117 execve guuid=1b3de3fc-1800-0000-cb86-556205140000 pid=5125 /usr/bin/wget net send-data write-file guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116->guuid=1b3de3fc-1800-0000-cb86-556205140000 pid=5125 execve guuid=3a1e381c-1900-0000-cb86-556226140000 pid=5158 /usr/bin/curl net send-data write-file guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116->guuid=3a1e381c-1900-0000-cb86-556226140000 pid=5158 execve guuid=9be90357-1900-0000-cb86-55625a140000 pid=5210 /usr/bin/chmod guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116->guuid=9be90357-1900-0000-cb86-55625a140000 pid=5210 execve guuid=3a06b357-1900-0000-cb86-55625b140000 pid=5211 /usr/bin/bash guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116->guuid=3a06b357-1900-0000-cb86-55625b140000 pid=5211 clone guuid=72c1f458-1900-0000-cb86-55625d140000 pid=5213 /usr/bin/rm delete-file guuid=c4f3eff8-1800-0000-cb86-5562fc130000 pid=5116->guuid=72c1f458-1900-0000-cb86-55625d140000 pid=5213 execve 703658b4-b613-5a4b-8128-f0d2d65db82f 91.231.222.195:80 guuid=1b3de3fc-1800-0000-cb86-556205140000 pid=5125->703658b4-b613-5a4b-8128-f0d2d65db82f send: 144B guuid=3a1e381c-1900-0000-cb86-556226140000 pid=5158->703658b4-b613-5a4b-8128-f0d2d65db82f send: 93B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-31 08:07:14 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:sora antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
Contacts a large (142401) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e00296a2d0fc5ebfb13b01165f47bc138d6ad4148ed2241c1b85b1ab1e5ae97e

(this sample)

  
Delivery method
Distributed via web download

Comments