MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e7ed9467b9d9b83a6b707cf616b94ac1d063d11cb87dd584fbe61b0bb74e5cac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: e7ed9467b9d9b83a6b707cf616b94ac1d063d11cb87dd584fbe61b0bb74e5cac
SHA3-384 hash: facf3f804f844303700611bf48894865ca8e51e742f73b0ef421f5abd9f0c4b01a8e5bae88349d32d21b9b80ad301eab
SHA1 hash: a28370409f6df2df10c4313af92278eaa5e60d9c
MD5 hash: a091b08340a39341d42cbaddbd18d034
humanhash: bulldog-quebec-vegan-alpha
File name:1.sh
Download: download sample
Signature Mirai
File size:2'445 bytes
First seen:2025-09-18 16:59:38 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:ItqkSsqntqeusqbGWq5/5OsqR6qqGzG8Jq8rq5nlLqgzgNILXksqfBqFkMqGZxqy:ib2t+QZq1CGHolLxXJyWvx1Ff
TLSH T16751D4CA21534A792DAFD923F3B9461875809CE710CB9F94D9ED3CF85C8DD0830A6A42
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.153.69.151/x8656fb720aa04bb923a80712cd690510c2c532e5cc3fe0e32868eb4097cc3132bf Mirai32-bit elf mirai Mozi
http://103.153.69.151/mips9bad584a9bcc3747c703d637720558a9f6389c636f7515c8e6cce8d31a91a8a2 Mirai32-bit elf mirai Mozi
http://103.153.69.151/arcn/an/aelf ua-wget
http://103.153.69.151/i468n/an/aelf ua-wget
http://103.153.69.151/i686n/an/aelf ua-wget
http://103.153.69.151/x86_64n/an/aelf ua-wget
http://103.153.69.151/mpsla974b7de7fff143231cceb4336d022192096f814e7512a7d246fef7235ccb606 Miraielf geofenced mips mirai ua-wget USA
http://103.153.69.151/arm3e5ee85c900647af568d41076a3dc1a2600dbbd1355744895b89181ce44ca7f4 Mirai32-bit elf mirai Mozi
http://103.153.69.151/arm5f780dc09d326a38c0d712fea1243112d6148f81d323529bd726ffca0e8382805 Miraielf geofenced mirai ua-wget USA
http://103.153.69.151/arm6dd7ef996397753a979ec93c81eb09ebb653a52311fad9d277a2c6bada7045b18 Miraielf geofenced mirai ua-wget USA
http://103.153.69.151/arm78499db38a52efc4646eb70e5b1a1e6c4cdea4c4811bd255559303cc002ac3593 Miraielf geofenced mirai ua-wget USA
http://103.153.69.151/ppce265dc0f30fe92f3aeb7c2722d4aff0a6310b3dd90a30ff10c3a77c507fcee56 Miraielf geofenced mirai ua-wget USA
http://103.153.69.151/spcn/an/aelf ua-wget
http://103.153.69.151/m68kn/an/aelf ua-wget
http://103.153.69.151/sh4n/an/aelf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
41
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-18T14:30:00Z UTC
Last seen:
2025-09-18T14:30:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.cx HEUR:Trojan-Downloader.Shell.Agent.a HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen
Status:
terminated
Behavior Graph:
%3 guuid=e9065795-1a00-0000-458e-1184ac0c0000 pid=3244 /usr/bin/sudo guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250 /tmp/sample.bin guuid=e9065795-1a00-0000-458e-1184ac0c0000 pid=3244->guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250 execve guuid=c1dbc798-1a00-0000-458e-1184b40c0000 pid=3252 /usr/bin/cp guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=c1dbc798-1a00-0000-458e-1184b40c0000 pid=3252 execve guuid=ac5578a0-1a00-0000-458e-1184bf0c0000 pid=3263 /usr/bin/wget net send-data write-file guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=ac5578a0-1a00-0000-458e-1184bf0c0000 pid=3263 execve guuid=e024ef23-1b00-0000-458e-1184c50d0000 pid=3525 /usr/bin/curl net send-data write-file guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=e024ef23-1b00-0000-458e-1184c50d0000 pid=3525 execve guuid=286cbab4-1b00-0000-458e-1184ec0e0000 pid=3820 /usr/bin/chmod guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=286cbab4-1b00-0000-458e-1184ec0e0000 pid=3820 execve guuid=fb4f20b5-1b00-0000-458e-1184ed0e0000 pid=3821 /tmp/x86 delete-file guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=fb4f20b5-1b00-0000-458e-1184ed0e0000 pid=3821 execve guuid=8bdcd1b6-1b00-0000-458e-1184f80e0000 pid=3832 /usr/bin/rm guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=8bdcd1b6-1b00-0000-458e-1184f80e0000 pid=3832 execve guuid=2c5c7bb8-1b00-0000-458e-1184fb0e0000 pid=3835 /usr/bin/wget net send-data write-file guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=2c5c7bb8-1b00-0000-458e-1184fb0e0000 pid=3835 execve guuid=9abb1707-1c00-0000-458e-118409100000 pid=4105 /usr/bin/curl net send-data guuid=4095d697-1a00-0000-458e-1184b20c0000 pid=3250->guuid=9abb1707-1c00-0000-458e-118409100000 pid=4105 execve 4a11bae5-96b9-5d35-a72a-4e49f7748dce 103.153.69.151:80 guuid=ac5578a0-1a00-0000-458e-1184bf0c0000 pid=3263->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 132B guuid=e024ef23-1b00-0000-458e-1184c50d0000 pid=3525->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 81B guuid=7d48a6b6-1b00-0000-458e-1184f50e0000 pid=3829 /tmp/x86 delete-file zombie guuid=fb4f20b5-1b00-0000-458e-1184ed0e0000 pid=3821->guuid=7d48a6b6-1b00-0000-458e-1184f50e0000 pid=3829 clone guuid=ae9eadb6-1b00-0000-458e-1184f60e0000 pid=3830 /tmp/x86 guuid=fb4f20b5-1b00-0000-458e-1184ed0e0000 pid=3821->guuid=ae9eadb6-1b00-0000-458e-1184f60e0000 pid=3830 clone guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831 /tmp/x86 dns net send-data zombie guuid=fb4f20b5-1b00-0000-458e-1184ed0e0000 pid=3821->guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831 clone afe192fb-736d-5df2-ad22-9276ad1588e5 202.61.197.122:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->afe192fb-736d-5df2-ad22-9276ad1588e5 send: 38B e7e3f3be-4c6e-5491-b4cf-189f3e7a0301 65.21.1.106:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->e7e3f3be-4c6e-5491-b4cf-189f3e7a0301 send: 38B df483ae4-6ba9-54f4-9314-7fb275b67abb bot.federalagent.xyz:18730 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->df483ae4-6ba9-54f4-9314-7fb275b67abb send: 12B ac0b4284-2aa4-5c89-80a0-995c690355af 81.169.136.222:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->ac0b4284-2aa4-5c89-80a0-995c690355af send: 38B b8c9f653-6e39-524f-9c9b-e553e33a8f3b bot.federalagent.xyz:17645 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->b8c9f653-6e39-524f-9c9b-e553e33a8f3b send: 12B c0b60401-2787-5e57-85f9-7652823a4a8e 70.34.254.19:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->c0b60401-2787-5e57-85f9-7652823a4a8e send: 38B a7cd0bd1-5b44-573f-8ca4-bf2acb8b2248 217.160.70.42:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->a7cd0bd1-5b44-573f-8ca4-bf2acb8b2248 send: 38B c67eef02-3b7d-5188-acef-6fada840dd98 bot.federalagent.xyz:16816 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->c67eef02-3b7d-5188-acef-6fada840dd98 send: 12B 84a380bc-aa57-5600-87c1-ca531ceab881 80.152.203.134:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->84a380bc-aa57-5600-87c1-ca531ceab881 send: 38B 5abc1921-2a11-59ea-98a0-4d940defe52a bot.federalagent.xyz:10918 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->5abc1921-2a11-59ea-98a0-4d940defe52a send: 12B dfbba946-d173-52db-8652-a0bdf63a76bb 64.176.6.48:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->dfbba946-d173-52db-8652-a0bdf63a76bb send: 38B 2e1ca1bf-8e0e-51bd-a149-55d596118774 139.84.165.176:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->2e1ca1bf-8e0e-51bd-a149-55d596118774 send: 38B 87c2dbf2-2b8a-5511-a250-d778ce5cd415 185.181.61.24:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->87c2dbf2-2b8a-5511-a250-d778ce5cd415 send: 38B e4f1b1be-381f-5fff-8117-ef576f4c9381 bot.federalagent.xyz:10679 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->e4f1b1be-381f-5fff-8117-ef576f4c9381 send: 12B 290f2f6d-9b03-5a51-9b59-33627a07e20d 137.220.52.23:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->290f2f6d-9b03-5a51-9b59-33627a07e20d send: 38B 69e3eade-acae-5a5a-b527-3b224017b69e 168.235.111.72:53 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->69e3eade-acae-5a5a-b527-3b224017b69e send: 38B 56f47fa3-36cb-5540-90a7-97e96e022207 bot.federalagent.xyz:20015 guuid=39f4b5b6-1b00-0000-458e-1184f70e0000 pid=3831->56f47fa3-36cb-5540-90a7-97e96e022207 send: 12B guuid=2c5c7bb8-1b00-0000-458e-1184fb0e0000 pid=3835->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 133B guuid=9abb1707-1c00-0000-458e-118409100000 pid=4105->4a11bae5-96b9-5d35-a72a-4e49f7748dce send: 82B
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-09-18 17:04:42 UTC
File Type:
Text (Shell)
AV detection:
16 of 24 (66.67%)
Threat level:
  3/5
Result
Malware family:
hailbot
Score:
  10/10
Tags:
family:hailbot antivm botnet defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Detect Hailbot Linux botnet
Hailbot
Hailbot family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e7ed9467b9d9b83a6b707cf616b94ac1d063d11cb87dd584fbe61b0bb74e5cac

(this sample)

  
Delivery method
Distributed via web download

Comments