MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4cecac9aa59e179ec2381da2e8a5120ae7cc4b91d89d540cdf138c8d9eb4251. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e4cecac9aa59e179ec2381da2e8a5120ae7cc4b91d89d540cdf138c8d9eb4251
SHA3-384 hash: a66c186e2f4971ede57b81a5925dbb81d4aa98298469dfb17c2dca9d8537aca01d6a580ca244536e9d5d91f38209b437
SHA1 hash: 05715efc9d4a311bb6e16792538054a0940047ba
MD5 hash: 4a38eabaaea4c66bee75cbe0de12f137
humanhash: fanta-failed-pennsylvania-victor
File name:t.sh
Download: download sample
Signature Mirai
File size:510 bytes
First seen:2025-08-01 12:41:45 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:7VTG1cck1ce/LQXo1B/K1q/6NIb/1Ke/Hro1D:7VT5cbe/LN/n/6NIboe/L2
TLSH T1B8F0BE8EA9103D93898DFEAFB36194CEE042D3CC612F13D9ECC2C8BD9596581F064A24
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://66.63.187.141/mips7124a65bf24f9edba23f44feeace7c17c40c84a3977c2220d6742e188928612e Mirai32-bit elf gafgyt mirai Mozi
http://66.63.187.141/mpsl2d1cf20f3c60d797308489012c7552b1db022dfbfcf8bb1c71fe360290f597f2 Miraielf mirai ua-wget
http://66.63.187.141/armc7ce30048cff8cd281aae097b739ac1ec446aaa0eb48a746a6f03420e4b28076 Gafgyt32-bit elf gafgyt Mozi
http://66.63.187.141/arm52153f7f0232ac7e9fb23ee4c50aabb18c7f32ff2653f213796fb55b3229aabf4 Miraielf gafgyt mirai ua-wget
http://66.63.187.141/arm66062592a30f707d9cc1d5ba80dd76140736d28829df170f53a710bf182b83ce9 Miraielf mirai ua-wget
http://66.63.187.141/arm78caac9e05312ee38e05a89b23e920a5901c4c88736db0b345e5184dbef7ce50b Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Status:
terminated
Behavior Graph:
%3 guuid=a1c78b5d-2000-0000-ebe3-71135a0a0000 pid=2650 /usr/bin/sudo guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655 /tmp/sample.bin guuid=a1c78b5d-2000-0000-ebe3-71135a0a0000 pid=2650->guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655 execve guuid=e51f6c5f-2000-0000-ebe3-7113610a0000 pid=2657 /usr/bin/wget net send-data write-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=e51f6c5f-2000-0000-ebe3-7113610a0000 pid=2657 execve guuid=cdae7d6d-2000-0000-ebe3-71138d0a0000 pid=2701 /usr/bin/chmod guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=cdae7d6d-2000-0000-ebe3-71138d0a0000 pid=2701 execve guuid=2cecc56d-2000-0000-ebe3-71138e0a0000 pid=2702 /usr/bin/dash guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=2cecc56d-2000-0000-ebe3-71138e0a0000 pid=2702 clone guuid=6d42506e-2000-0000-ebe3-7113920a0000 pid=2706 /usr/bin/rm delete-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=6d42506e-2000-0000-ebe3-7113920a0000 pid=2706 execve guuid=16f58d6e-2000-0000-ebe3-7113930a0000 pid=2707 /usr/bin/rm guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=16f58d6e-2000-0000-ebe3-7113930a0000 pid=2707 execve guuid=8328c56e-2000-0000-ebe3-7113950a0000 pid=2709 /usr/bin/wget net send-data write-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=8328c56e-2000-0000-ebe3-7113950a0000 pid=2709 execve guuid=0dbd157c-2000-0000-ebe3-7113b60a0000 pid=2742 /usr/bin/chmod guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=0dbd157c-2000-0000-ebe3-7113b60a0000 pid=2742 execve guuid=acfc4d7c-2000-0000-ebe3-7113b70a0000 pid=2743 /usr/bin/dash guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=acfc4d7c-2000-0000-ebe3-7113b70a0000 pid=2743 clone guuid=a7aaea7c-2000-0000-ebe3-7113bb0a0000 pid=2747 /usr/bin/rm delete-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=a7aaea7c-2000-0000-ebe3-7113bb0a0000 pid=2747 execve guuid=1f31377d-2000-0000-ebe3-7113bd0a0000 pid=2749 /usr/bin/rm guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=1f31377d-2000-0000-ebe3-7113bd0a0000 pid=2749 execve guuid=b866977d-2000-0000-ebe3-7113bf0a0000 pid=2751 /usr/bin/wget net send-data write-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=b866977d-2000-0000-ebe3-7113bf0a0000 pid=2751 execve guuid=0c4eb489-2000-0000-ebe3-7113d00a0000 pid=2768 /usr/bin/chmod guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=0c4eb489-2000-0000-ebe3-7113d00a0000 pid=2768 execve guuid=16a3608a-2000-0000-ebe3-7113d10a0000 pid=2769 /usr/bin/dash guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=16a3608a-2000-0000-ebe3-7113d10a0000 pid=2769 clone guuid=9356918b-2000-0000-ebe3-7113d30a0000 pid=2771 /usr/bin/rm delete-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=9356918b-2000-0000-ebe3-7113d30a0000 pid=2771 execve guuid=37b5158c-2000-0000-ebe3-7113d40a0000 pid=2772 /usr/bin/rm guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=37b5158c-2000-0000-ebe3-7113d40a0000 pid=2772 execve guuid=28e3848c-2000-0000-ebe3-7113d60a0000 pid=2774 /usr/bin/wget net send-data write-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=28e3848c-2000-0000-ebe3-7113d60a0000 pid=2774 execve guuid=09a42d99-2000-0000-ebe3-7113e80a0000 pid=2792 /usr/bin/chmod guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=09a42d99-2000-0000-ebe3-7113e80a0000 pid=2792 execve guuid=e23fb999-2000-0000-ebe3-7113ea0a0000 pid=2794 /usr/bin/dash guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=e23fb999-2000-0000-ebe3-7113ea0a0000 pid=2794 clone guuid=3f186a9a-2000-0000-ebe3-7113ee0a0000 pid=2798 /usr/bin/rm delete-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=3f186a9a-2000-0000-ebe3-7113ee0a0000 pid=2798 execve guuid=283bb59a-2000-0000-ebe3-7113ef0a0000 pid=2799 /usr/bin/rm guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=283bb59a-2000-0000-ebe3-7113ef0a0000 pid=2799 execve guuid=81ee0b9b-2000-0000-ebe3-7113f10a0000 pid=2801 /usr/bin/wget net send-data write-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=81ee0b9b-2000-0000-ebe3-7113f10a0000 pid=2801 execve guuid=5eb279a7-2000-0000-ebe3-7113130b0000 pid=2835 /usr/bin/chmod guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=5eb279a7-2000-0000-ebe3-7113130b0000 pid=2835 execve guuid=246bcda7-2000-0000-ebe3-7113140b0000 pid=2836 /usr/bin/dash guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=246bcda7-2000-0000-ebe3-7113140b0000 pid=2836 clone guuid=dd2793a8-2000-0000-ebe3-7113170b0000 pid=2839 /usr/bin/rm delete-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=dd2793a8-2000-0000-ebe3-7113170b0000 pid=2839 execve guuid=c927d0a8-2000-0000-ebe3-7113190b0000 pid=2841 /usr/bin/rm guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=c927d0a8-2000-0000-ebe3-7113190b0000 pid=2841 execve guuid=31390fa9-2000-0000-ebe3-71131b0b0000 pid=2843 /usr/bin/wget net send-data write-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=31390fa9-2000-0000-ebe3-71131b0b0000 pid=2843 execve guuid=68790db9-2000-0000-ebe3-71133d0b0000 pid=2877 /usr/bin/chmod guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=68790db9-2000-0000-ebe3-71133d0b0000 pid=2877 execve guuid=c08e4ab9-2000-0000-ebe3-71133e0b0000 pid=2878 /usr/bin/dash guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=c08e4ab9-2000-0000-ebe3-71133e0b0000 pid=2878 clone guuid=f13cd2b9-2000-0000-ebe3-7113410b0000 pid=2881 /usr/bin/rm delete-file guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=f13cd2b9-2000-0000-ebe3-7113410b0000 pid=2881 execve guuid=daec0eba-2000-0000-ebe3-7113430b0000 pid=2883 /usr/bin/rm guuid=ce27365f-2000-0000-ebe3-71135f0a0000 pid=2655->guuid=daec0eba-2000-0000-ebe3-7113430b0000 pid=2883 execve a4f1e28a-5799-5623-8429-fc4b4fdc9ca8 66.63.187.141:80 guuid=e51f6c5f-2000-0000-ebe3-7113610a0000 pid=2657->a4f1e28a-5799-5623-8429-fc4b4fdc9ca8 send: 132B guuid=8328c56e-2000-0000-ebe3-7113950a0000 pid=2709->a4f1e28a-5799-5623-8429-fc4b4fdc9ca8 send: 132B guuid=b866977d-2000-0000-ebe3-7113bf0a0000 pid=2751->a4f1e28a-5799-5623-8429-fc4b4fdc9ca8 send: 131B guuid=28e3848c-2000-0000-ebe3-7113d60a0000 pid=2774->a4f1e28a-5799-5623-8429-fc4b4fdc9ca8 send: 132B guuid=81ee0b9b-2000-0000-ebe3-7113f10a0000 pid=2801->a4f1e28a-5799-5623-8429-fc4b4fdc9ca8 send: 132B guuid=31390fa9-2000-0000-ebe3-71131b0b0000 pid=2843->a4f1e28a-5799-5623-8429-fc4b4fdc9ca8 send: 132B
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-08-01 12:28:50 UTC
File Type:
Text (Shell)
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e4cecac9aa59e179ec2381da2e8a5120ae7cc4b91d89d540cdf138c8d9eb4251

(this sample)

  
Delivery method
Distributed via web download

Comments