MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e85eb5bccd2cfb000db6a0a4dd0d29921e1e512fa3787a1eb15e764a0b050037. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: e85eb5bccd2cfb000db6a0a4dd0d29921e1e512fa3787a1eb15e764a0b050037
SHA3-384 hash: 6f8a010fe79bdcff90c69f0a592dccca7b430fdccfb9ebfe6e5c100fd49cdfa8fe5934ec6d00485799b88183502c29d0
SHA1 hash: 8af1f1b4c61a07248c9a1672dd401c4abdcd161e
MD5 hash: 7607422f369a9d4752abe91f0455f12a
humanhash: orange-steak-september-vegan
File name:run.sh
Download: download sample
Signature Mirai
File size:2'881 bytes
First seen:2026-04-01 14:27:09 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 48:q+N8O82JMIVyVbiB8xnxuZUAUAcvyyk1YnYbwLPtxtm9YBnOnhM3Ia0:A52JMMqbiBsxuZQYbwY
TLSH T11351A29B0280DB72D65CC54FB7F8B534B14AA18366DF9E08ED801A2C8ED9D4C76C5F44
Magika shell
Reporter BlinkzSec
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnaarch64xnxnca96fc9183ce01efec68233bab25837b3f506e8ccb54dc3bad9976bdf012c40a Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxni386xnxnf722fa53c615a7655cdd2d6d9b7c0dd723de234d3fa6d9a573d5d728a6daf894 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnloongarch64xnxn6dbffd29dc9d670bde2b4569985ec22380eed1bbd01654735d5af039cca8de36 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnm68kxnxndde9fd731944a00b0403933560459362c2cf1ab1586062545f2050faf55f77c4 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnmicroblazexnxnfe0f5e7f7cf81296ce5c7ab4347ec98fcd0553081a24030061380bbf7af867b2 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnmipsxnxn52dae64b4f830c0437008cae906f34607b4016bf6e68c3ace0816b6872b2bf5c Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnor1kxnxncad72da6c1967ed10fc55bd37f4624fee16511074a8afb7f9a6f1d9c9c37e282 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnpowerpcxnxnd72aa8b312077ef515ff412ce72dc38691ff6de07238c81e0dd5e67ae5424bd6 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnriscv32xnxnce8de045874385a199fa6650b514893506c52c8a82dbeb654bcc7f3a84108c84 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnriscv64xnxn0c57d23d936183c57b246b84ac572d7c9bc6f418841af2f26205244cfa5a6669 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnsh2xnxnc76a44798598a9fa8df928f33fe4b80409ca1d9a8b6122e564bf25af3ad6c072 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnsh4xnxn6fe4a53323e0dcaed0c57799048ec76236b93de15b9d0266ad1b678cbfb5aec2 Mirai176-65-139-41 elf mirai ua-wget
http://176.65.139.41/bins/xnxnxnxnxnxnxnxnx86_64xnxnacc5780bade13667b2f6a3b428046546e950a45bc0226bf771382e5f8bc696fb Mirai176-65-139-41 elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
40
Origin country :
GB GB
Vendor Threat Intelligence
Gathering data
Result
Gathering data
Verdict:
Malicious
File Type:
cmd
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2026-04-01 14:12:53 UTC
File Type:
Text (Shell)
AV detection:
4 of 36 (11.11%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e85eb5bccd2cfb000db6a0a4dd0d29921e1e512fa3787a1eb15e764a0b050037

(this sample)

  
Delivery method
Distributed via web download

Comments