MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e5b3bd17048e3b9e7b69ec81f900cf63144b705de7a8cd9dd3bd0637c6b3b291. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e5b3bd17048e3b9e7b69ec81f900cf63144b705de7a8cd9dd3bd0637c6b3b291
SHA3-384 hash: 26f53738986b633572a9b0dc1e786da171dc11ade9b71a6ade957c794008ec29cba068fa8c561a6bee5d4699a56b3c58
SHA1 hash: 030e4dd7e528812a8f581463dbed756a2081bc83
MD5 hash: 006f6376f19eefd02d30e3cb9b91a962
humanhash: stairway-colorado-july-arkansas
File name:dvr.sh
Download: download sample
Signature Mirai
File size:1'139 bytes
First seen:2025-07-21 17:18:27 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:ohBh9Mk8QoWLptV5+/I/V7ITt2n292o2+2vc2GSQ:ohL8QoWPV5+wV7I5G2FjYcYQ
TLSH T1B0219B9AE540E9B0B9CA50063287DB5EE4B593E80D830C60EC5AF6B4BD8C86CF012D58
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.133.58/skid.arm4c72b3a3e372704eb64e1f0e9ebd021902928fa8c6df47e15a347fa682d48916 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm5495ce809e735ffcdf61aee835d0dc9201ef56aa045252cfa3e7029aac8a0b891 Miraielf mirai ua-wget
http://154.205.133.58/skid.arm7cac1f84aafd6f3b5d144e2bdad81f759d12515d73fac77cb8ac09678f2c28f52 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=0b5cdce5-1700-0000-2c0d-a4bd4b0b0000 pid=2891 /usr/bin/sudo guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900 /tmp/sample.bin guuid=0b5cdce5-1700-0000-2c0d-a4bd4b0b0000 pid=2891->guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900 execve guuid=32252aef-1700-0000-2c0d-a4bd5e0b0000 pid=2910 /usr/bin/rm guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=32252aef-1700-0000-2c0d-a4bd5e0b0000 pid=2910 execve guuid=5c35bbef-1700-0000-2c0d-a4bd5f0b0000 pid=2911 /usr/bin/wget net send-data write-file guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=5c35bbef-1700-0000-2c0d-a4bd5f0b0000 pid=2911 execve guuid=387713f4-1700-0000-2c0d-a4bd670b0000 pid=2919 /usr/bin/chmod guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=387713f4-1700-0000-2c0d-a4bd670b0000 pid=2919 execve guuid=36305df4-1700-0000-2c0d-a4bd680b0000 pid=2920 /usr/bin/dash guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=36305df4-1700-0000-2c0d-a4bd680b0000 pid=2920 clone guuid=48c3def4-1700-0000-2c0d-a4bd6b0b0000 pid=2923 /usr/bin/rm guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=48c3def4-1700-0000-2c0d-a4bd6b0b0000 pid=2923 execve guuid=f3f318f5-1700-0000-2c0d-a4bd6d0b0000 pid=2925 /usr/bin/wget net send-data write-file guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=f3f318f5-1700-0000-2c0d-a4bd6d0b0000 pid=2925 execve guuid=16ac5af7-1700-0000-2c0d-a4bd740b0000 pid=2932 /usr/bin/chmod guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=16ac5af7-1700-0000-2c0d-a4bd740b0000 pid=2932 execve guuid=048e95f7-1700-0000-2c0d-a4bd760b0000 pid=2934 /usr/bin/dash guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=048e95f7-1700-0000-2c0d-a4bd760b0000 pid=2934 clone guuid=6e3b16f8-1700-0000-2c0d-a4bd7a0b0000 pid=2938 /usr/bin/rm guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=6e3b16f8-1700-0000-2c0d-a4bd7a0b0000 pid=2938 execve guuid=5c465ff8-1700-0000-2c0d-a4bd7c0b0000 pid=2940 /usr/bin/wget net send-data write-file guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=5c465ff8-1700-0000-2c0d-a4bd7c0b0000 pid=2940 execve guuid=b5d313fb-1700-0000-2c0d-a4bd800b0000 pid=2944 /usr/bin/chmod guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=b5d313fb-1700-0000-2c0d-a4bd800b0000 pid=2944 execve guuid=ad025cfb-1700-0000-2c0d-a4bd820b0000 pid=2946 /usr/bin/dash guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=ad025cfb-1700-0000-2c0d-a4bd820b0000 pid=2946 clone guuid=ab90f6fb-1700-0000-2c0d-a4bd860b0000 pid=2950 /usr/bin/busybox guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=ab90f6fb-1700-0000-2c0d-a4bd860b0000 pid=2950 execve guuid=b2d526fc-1700-0000-2c0d-a4bd870b0000 pid=2951 /usr/bin/busybox guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=b2d526fc-1700-0000-2c0d-a4bd870b0000 pid=2951 execve guuid=dc7054fc-1700-0000-2c0d-a4bd890b0000 pid=2953 /usr/bin/busybox guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=dc7054fc-1700-0000-2c0d-a4bd890b0000 pid=2953 execve guuid=2cc882fc-1700-0000-2c0d-a4bd8a0b0000 pid=2954 /usr/bin/busybox guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=2cc882fc-1700-0000-2c0d-a4bd8a0b0000 pid=2954 execve guuid=050aa8fc-1700-0000-2c0d-a4bd8b0b0000 pid=2955 /usr/bin/busybox guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=050aa8fc-1700-0000-2c0d-a4bd8b0b0000 pid=2955 execve guuid=c451d0fc-1700-0000-2c0d-a4bd8d0b0000 pid=2957 /usr/bin/busybox guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=c451d0fc-1700-0000-2c0d-a4bd8d0b0000 pid=2957 execve guuid=6630f9fc-1700-0000-2c0d-a4bd8e0b0000 pid=2958 /usr/bin/busybox guuid=dbbca8e8-1700-0000-2c0d-a4bd540b0000 pid=2900->guuid=6630f9fc-1700-0000-2c0d-a4bd8e0b0000 pid=2958 execve a6b092b1-7e1c-56ee-bf44-eccdde92b493 154.205.133.58:80 guuid=5c35bbef-1700-0000-2c0d-a4bd5f0b0000 pid=2911->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 137B guuid=f3f318f5-1700-0000-2c0d-a4bd6d0b0000 pid=2925->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 138B guuid=5c465ff8-1700-0000-2c0d-a4bd7c0b0000 pid=2940->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 138B
Verdict:
Malicious
Threat:
HEUR:Trojan-Downloader.Shell.Agent
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-07-21 17:19:25 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e5b3bd17048e3b9e7b69ec81f900cf63144b705de7a8cd9dd3bd0637c6b3b291

(this sample)

  
Delivery method
Distributed via web download

Comments