MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e912c422768420f34d8a3f4a438c72f0087f9d07fd483630beb419606c177172. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: e912c422768420f34d8a3f4a438c72f0087f9d07fd483630beb419606c177172
SHA3-384 hash: 13667c0e372b57c828b04a9460b372876a52c804c24508b622e498edaebed83f7b0eaac6efc78366dc3f494ebbf08ab3
SHA1 hash: 633a11bfbda78dc4e338938d9844d53d7e5b3a34
MD5 hash: a80ed9682ff676578363b2b7658d9838
humanhash: eighteen-zulu-hot-asparagus
File name:run.sh
Download: download sample
Signature Mirai
File size:2'881 bytes
First seen:2025-12-21 19:47:47 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:Ju2JMVjbiB98uZ0E1EnE2EhEqXtbwIxJUfw5hM3K:Ju2JMVjbiB98uZ00cvyNtbw85hM3K
TLSH T1EF51F8DB02048F71E71D875EF7F67178610FA0D2E6DB8A84AA46082D4ED9E4D7789E80
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnaarch64xnxn96804389b4daaff7b78e3d3753c3579210e7732f148699204c627856d6a43a00 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxni386xnxnae948107b21e72121fd4a53d79ba6097f68a0c78502ebd1b82db388dd09ffc98 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnloongarch64xnxn00785c8e6d89c617b02e7f59bcdc4a829c1c974fdb3eb1aec75320c1677ea32b Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnm68kxnxn93aab5f35ee3b44cdb193841cb04fb372e76b230b99206e69ae4104f743dbaf4 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnmicroblazexnxnd267731014e08a45ca43b1b96f9d69938e40e5fb13f6cd8b134b7d2435542ee6 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnmipsxnxncb49dc9c1922372fa31a53e881b3ac3b0652b2e238459aad866fb94a8f0be3fd Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnor1kxnxnbec1afbd5d28f0edb725ecbff02ce53164e008f9d64afdca11fd5d2bc1756ae7 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnpowerpcxnxn5045f5765a7a317f2109e3669bd19159e7eb9d869c787cfbf1100dba5c3356be Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnriscv32xnxn95ff5d8d93bc895f563f6e41acf9c2bc4e3b6e64b01b0ee1546f55b116a3bf6f Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnriscv64xnxn71678e4bb17ef89a6df23dc992e86e90a0d9c10b7c42ef126e3ba4a295757d78 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnsh2xnxn24fa840c0db6518933652a90c063da8e90d3a902cb8beabc3b369efc7d97bdd8 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnsh4xnxnf405c1db4df51106db3481ed5bb07c0f254a1cfc8571d4de1bddf67773fe5e69 Miraielf mirai opendir ua-wget
http://94.156.152.67/bins/xnxnxnxnxnxnxnxnx86_64xnxndc3376e0b7ca3cf0c63144dc3b36cd74afc74a8835b245c003574f59675d997e Miraielf mirai opendir ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T17:43:00Z UTC
Last seen:
2025-12-22T21:28:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-12-21 19:48:24 UTC
File Type:
Text (Shell)
AV detection:
9 of 38 (23.68%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh e912c422768420f34d8a3f4a438c72f0087f9d07fd483630beb419606c177172

(this sample)

  
Delivery method
Distributed via web download

Comments