MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e64124e337da6f27f46d7bb35cfd538029a52a4c9207c9a9d4f5342092edc1be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: e64124e337da6f27f46d7bb35cfd538029a52a4c9207c9a9d4f5342092edc1be
SHA3-384 hash: cce3d1fe4355db99df48f72df2b8ac73be2921353cee240fe0087641c63dc82c7290ae9c4892bdd937ad91f5b6b4bb6e
SHA1 hash: dfdf877f9e91cfdbadb8d22d6d93340e1a2fc4fe
MD5 hash: b815127aa7b71abe5e24b8ccc35a36fe
humanhash: sierra-cat-carbon-double
File name:dvr.sh
Download: download sample
Signature Mirai
File size:346 bytes
First seen:2025-07-04 10:59:33 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:htI1RDjbWUtISpp8GvVbWUtIS3F/F2X/I/PN7IbWUtIS1FSeQ:bIbXP9pJvVPDX+/I/PN7IPzSeQ
TLSH T149E01AE6E455DFC6986A541C21D7C22CF0AAC3F41AC58A4C6C6E2976C98868CE45398C
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://154.205.133.58/lol.arm020b87fdaa06a1609bdc0c9bb9c5441241a1ac29ea656f087c19a385e5177766 Miraielf mirai ua-wget
http://154.205.133.58/lol.arm536796d056ca6b55227eccf5ef5d1bf83ba4b1b516013f98408210c9229169cc5 Miraielf mirai ua-wget
http://154.205.133.58/lol.arm79c765ec2b4b7ac6f218873fd11916bc996b7f6f443731885bba1108374214eb9 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
17
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=770a635a-1800-0000-d474-0e57890d0000 pid=3465 /usr/bin/sudo guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472 /tmp/sample.bin guuid=770a635a-1800-0000-d474-0e57890d0000 pid=3465->guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472 execve guuid=57bd565c-1800-0000-d474-0e57910d0000 pid=3473 /usr/bin/rm guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=57bd565c-1800-0000-d474-0e57910d0000 pid=3473 execve guuid=9e2ba45c-1800-0000-d474-0e57930d0000 pid=3475 /usr/bin/wget net send-data write-file guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=9e2ba45c-1800-0000-d474-0e57930d0000 pid=3475 execve guuid=1cf78a5f-1800-0000-d474-0e579d0d0000 pid=3485 /usr/bin/chmod guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=1cf78a5f-1800-0000-d474-0e579d0d0000 pid=3485 execve guuid=fc1ec55f-1800-0000-d474-0e579f0d0000 pid=3487 /usr/bin/dash guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=fc1ec55f-1800-0000-d474-0e579f0d0000 pid=3487 clone guuid=6ffd9e60-1800-0000-d474-0e57a40d0000 pid=3492 /usr/bin/rm guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=6ffd9e60-1800-0000-d474-0e57a40d0000 pid=3492 execve guuid=527bf660-1800-0000-d474-0e57a50d0000 pid=3493 /usr/bin/wget net send-data write-file guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=527bf660-1800-0000-d474-0e57a50d0000 pid=3493 execve guuid=84909f64-1800-0000-d474-0e57a60d0000 pid=3494 /usr/bin/chmod guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=84909f64-1800-0000-d474-0e57a60d0000 pid=3494 execve guuid=5778ef64-1800-0000-d474-0e57a70d0000 pid=3495 /usr/bin/dash guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=5778ef64-1800-0000-d474-0e57a70d0000 pid=3495 clone guuid=ee278265-1800-0000-d474-0e57a90d0000 pid=3497 /usr/bin/rm guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=ee278265-1800-0000-d474-0e57a90d0000 pid=3497 execve guuid=a3bbd165-1800-0000-d474-0e57aa0d0000 pid=3498 /usr/bin/wget net send-data write-file guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=a3bbd165-1800-0000-d474-0e57aa0d0000 pid=3498 execve guuid=1244e269-1800-0000-d474-0e57b20d0000 pid=3506 /usr/bin/chmod guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=1244e269-1800-0000-d474-0e57b20d0000 pid=3506 execve guuid=9819616a-1800-0000-d474-0e57b40d0000 pid=3508 /usr/bin/dash guuid=278d185c-1800-0000-d474-0e57900d0000 pid=3472->guuid=9819616a-1800-0000-d474-0e57b40d0000 pid=3508 clone a6b092b1-7e1c-56ee-bf44-eccdde92b493 154.205.133.58:80 guuid=9e2ba45c-1800-0000-d474-0e57930d0000 pid=3475->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 136B guuid=527bf660-1800-0000-d474-0e57a50d0000 pid=3493->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 137B guuid=a3bbd165-1800-0000-d474-0e57aa0d0000 pid=3498->a6b092b1-7e1c-56ee-bf44-eccdde92b493 send: 137B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-07-04 11:00:28 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads process memory
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e64124e337da6f27f46d7bb35cfd538029a52a4c9207c9a9d4f5342092edc1be

(this sample)

  
Delivery method
Distributed via web download

Comments