MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4999959c12cfbb50a7e10ca4e4ede384fa26c26586323c24fbdbae2697774ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e4999959c12cfbb50a7e10ca4e4ede384fa26c26586323c24fbdbae2697774ed
SHA3-384 hash: 351c1a244c7d54acb14c03cc2d464510afa61f2d434b2d94dc6080c4c3bb85cfc8bd7e08f59510038ab9d35460165257
SHA1 hash: 2bd1f232f87b2ab16ed55becb606fe0c8d024635
MD5 hash: 58f4c006d44748cbe8b07c85e2f78b1d
humanhash: california-fix-louisiana-crazy
File name:massload
Download: download sample
Signature Mirai
File size:1'187 bytes
First seen:2025-08-23 01:19:46 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:boWBGhBh9Mk8QoOwve7eJJH28O87ft2KA/matkk0:boGGhL8QofWsH28O87ft2Gat/0
TLSH T144217FDD83E0D22D8C468F40A2924B37F81A5BE420916DE8F54F28A6A45CD217074F27
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.176.20.59/mips7cd5fb5b6d94ac2acf16f8904f6f307f47710df1d51129d55e70590a52dcf823 Miraielf gafgyt mips mirai ua-wget
http://103.176.20.59/mpsle4acbf0a1448e928ea7714cf90692001c454b37d78b13a955f475568b36bbaec Miraielf mips mirai ua-wget
http://103.176.20.59/skid.arm8a235a9336092da5a5fd75dc7c04bf109a796cab8cbe52666f972c2c5f3ff285 Miraielf mirai ua-wget
http://103.176.20.59/skid.arm516877e8cab68f6d6a557b0bee1e41a6d938997cb31a62cfe017ed21867b41801 Miraielf mirai ua-wget
http://103.176.20.59/skid.arm70fd1878b69312fbf748d3be8ba65b3431083985fcfe65a3b32a74a8ef69cdf89 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
29
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Labled as:
Trojan[Downloader]/Shell.Agent
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-08-23T02:09:00Z UTC
Last seen:
2025-08-23T02:09:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=fb661c6b-1a00-0000-f303-6fa5000a0000 pid=2560 /usr/bin/sudo guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568 /tmp/sample.bin guuid=fb661c6b-1a00-0000-f303-6fa5000a0000 pid=2560->guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568 execve guuid=3b475d75-1a00-0000-f303-6fa5230a0000 pid=2595 /usr/bin/rm guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=3b475d75-1a00-0000-f303-6fa5230a0000 pid=2595 execve guuid=070dee75-1a00-0000-f303-6fa5260a0000 pid=2598 /usr/bin/wget net send-data write-file guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=070dee75-1a00-0000-f303-6fa5260a0000 pid=2598 execve guuid=fc9e6ef5-1a00-0000-f303-6fa51b0b0000 pid=2843 /usr/bin/chmod guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=fc9e6ef5-1a00-0000-f303-6fa51b0b0000 pid=2843 execve guuid=ba4913f6-1a00-0000-f303-6fa51d0b0000 pid=2845 /usr/bin/dash guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=ba4913f6-1a00-0000-f303-6fa51d0b0000 pid=2845 clone guuid=3caadef6-1a00-0000-f303-6fa5210b0000 pid=2849 /usr/bin/wget net send-data write-file guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=3caadef6-1a00-0000-f303-6fa5210b0000 pid=2849 execve guuid=d52e1138-1b00-0000-f303-6fa59c0b0000 pid=2972 /usr/bin/chmod guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=d52e1138-1b00-0000-f303-6fa59c0b0000 pid=2972 execve guuid=c0bd503f-1b00-0000-f303-6fa5ac0b0000 pid=2988 /usr/bin/dash guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=c0bd503f-1b00-0000-f303-6fa5ac0b0000 pid=2988 clone guuid=30a41540-1b00-0000-f303-6fa5b00b0000 pid=2992 /usr/bin/wget net send-data write-file guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=30a41540-1b00-0000-f303-6fa5b00b0000 pid=2992 execve guuid=e8ef3bb3-1b00-0000-f303-6fa58a0c0000 pid=3210 /usr/bin/chmod guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=e8ef3bb3-1b00-0000-f303-6fa58a0c0000 pid=3210 execve guuid=7ec69ab3-1b00-0000-f303-6fa58c0c0000 pid=3212 /usr/bin/dash guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=7ec69ab3-1b00-0000-f303-6fa58c0c0000 pid=3212 clone guuid=08f28fb5-1b00-0000-f303-6fa58e0c0000 pid=3214 /usr/bin/wget net send-data write-file guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=08f28fb5-1b00-0000-f303-6fa58e0c0000 pid=3214 execve guuid=3d7be0e8-1b00-0000-f303-6fa5d50c0000 pid=3285 /usr/bin/chmod guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=3d7be0e8-1b00-0000-f303-6fa5d50c0000 pid=3285 execve guuid=9ff518e9-1b00-0000-f303-6fa5d60c0000 pid=3286 /usr/bin/dash guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=9ff518e9-1b00-0000-f303-6fa5d60c0000 pid=3286 clone guuid=413e9fe9-1b00-0000-f303-6fa5d90c0000 pid=3289 /usr/bin/wget net send-data write-file guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=413e9fe9-1b00-0000-f303-6fa5d90c0000 pid=3289 execve guuid=dd0a3d2c-1c00-0000-f303-6fa55f0d0000 pid=3423 /usr/bin/chmod guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=dd0a3d2c-1c00-0000-f303-6fa55f0d0000 pid=3423 execve guuid=b1dadc2c-1c00-0000-f303-6fa5600d0000 pid=3424 /usr/bin/dash guuid=fe491d6d-1a00-0000-f303-6fa5080a0000 pid=2568->guuid=b1dadc2c-1c00-0000-f303-6fa5600d0000 pid=3424 clone 58517d70-7b02-5fe6-86d3-049c9f17a9ed 103.176.20.59:80 guuid=070dee75-1a00-0000-f303-6fa5260a0000 pid=2598->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 132B guuid=3caadef6-1a00-0000-f303-6fa5210b0000 pid=2849->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 132B guuid=30a41540-1b00-0000-f303-6fa5b00b0000 pid=2992->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 136B guuid=08f28fb5-1b00-0000-f303-6fa58e0c0000 pid=3214->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 137B guuid=413e9fe9-1b00-0000-f303-6fa5d90c0000 pid=3289->58517d70-7b02-5fe6-86d3-049c9f17a9ed send: 137B
Threat name:
Script.Trojan.Malgent
Status:
Malicious
First seen:
2025-08-23 02:15:18 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:botnet botnet credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (218332) amount of remote hosts
Creates a large amount of network flows
Mirai
Mirai family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e4999959c12cfbb50a7e10ca4e4ede384fa26c26586323c24fbdbae2697774ed

(this sample)

  
Delivery method
Distributed via web download

Comments