MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 efc7d25ea48997d056352f9f02883ee0d88fcbf565b74f57499fbb02d7d0284a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: efc7d25ea48997d056352f9f02883ee0d88fcbf565b74f57499fbb02d7d0284a
SHA3-384 hash: 0119038d8473e37a8b26019da8c15ff18c893cad0976c58a30239d1636b20639d83634d389a5b1ac3c94fe785e09b47c
SHA1 hash: a0e35914aa154b9979498ce0bc377e7fcb70520e
MD5 hash: 5df8e6f8babcae080b65a4841ffbbadb
humanhash: solar-may-oklahoma-artist
File name:c.sh
Download: download sample
Signature Mirai
File size:834 bytes
First seen:2025-09-29 18:21:54 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3J3735L1S735CYK735rNIl5173540LKF735K+OFp7353jMx735ZT0735eSOx7352:3J3TpYWNI7bKK+IDjeTfljtvdCn
TLSH T16701CCDCB7B162732A08DF64B16BC45C9130E4D4B2A80F66F9E90CB6C8D9201727DE79
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://161.97.149.138/systemcl/arm0aa6fd4f78bcee9f77a93153de85f0db4aa2e42464afcad9564ef46528697d44 Mirai32-bit elf mirai Mozi
http://161.97.149.138/systemcl/arm54b3fafa6af227c69f3164a2b4f85e7024361a714347c7f691099ed80736916ab Miraielf mirai
http://161.97.149.138/systemcl/arm6899c7e47c4e8f921e14bed7dcca677ed995ead6369168433011cac67ef6e5a59 Miraielf mirai
http://161.97.149.138/systemcl/arm7527debaef309134677a1c3a450dc5aea1f3a2a6f742fad86a20c80274c749630 Miraielf mirai
http://161.97.149.138/systemcl/m68kb819a17fd9314f13890dce05291b4c14b40477f0546c7481b4c2af576928244e Miraielf mirai
http://161.97.149.138/systemcl/mipsdc49d000be3daa749c372da39aad50bc49e8d944c7c868fb70b7d15e159d79d3 Mirai32-bit elf mirai Mozi
http://161.97.149.138/systemcl/mpslc5da1b833565988e4bb1729244b07d55ff21148392a7143ff5aab70f43788d6b Miraielf mirai
http://161.97.149.138/systemcl/ppcdcd7d4b917223e33897da06b7fdb676d16aa4d7afc0276bb4525c275b0a45b10 Miraielf mirai
http://161.97.149.138/systemcl/sh4n/an/aelf ua-wget
http://161.97.149.138/systemcl/spcn/an/aelf ua-wget
http://161.97.149.138/systemcl/x86d167fe5abe306825e029bd799bb645048ccae15dca31ea4ac9fcb8b416142a3a Mirai32-bit elf mirai Mozi
http://161.97.149.138/systemcl/x86_64d167fe5abe306825e029bd799bb645048ccae15dca31ea4ac9fcb8b416142a3a Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-09-29T11:39:00Z UTC
Last seen:
2025-09-29T11:39:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=3abea604-1a00-0000-aeaa-a04d830b0000 pid=2947 /usr/bin/sudo guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956 /tmp/sample.bin guuid=3abea604-1a00-0000-aeaa-a04d830b0000 pid=2947->guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956 execve guuid=07fb9507-1a00-0000-aeaa-a04d8d0b0000 pid=2957 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=07fb9507-1a00-0000-aeaa-a04d8d0b0000 pid=2957 execve guuid=38a7d514-1a00-0000-aeaa-a04da30b0000 pid=2979 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=38a7d514-1a00-0000-aeaa-a04da30b0000 pid=2979 execve guuid=a8905615-1a00-0000-aeaa-a04da60b0000 pid=2982 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=a8905615-1a00-0000-aeaa-a04da60b0000 pid=2982 clone guuid=3ef48a15-1a00-0000-aeaa-a04da70b0000 pid=2983 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=3ef48a15-1a00-0000-aeaa-a04da70b0000 pid=2983 execve guuid=1e0ce819-1a00-0000-aeaa-a04dae0b0000 pid=2990 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=1e0ce819-1a00-0000-aeaa-a04dae0b0000 pid=2990 execve guuid=b5ab4e1a-1a00-0000-aeaa-a04daf0b0000 pid=2991 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=b5ab4e1a-1a00-0000-aeaa-a04daf0b0000 pid=2991 clone guuid=d4d3551a-1a00-0000-aeaa-a04db00b0000 pid=2992 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=d4d3551a-1a00-0000-aeaa-a04db00b0000 pid=2992 execve guuid=a5848523-1a00-0000-aeaa-a04dc60b0000 pid=3014 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=a5848523-1a00-0000-aeaa-a04dc60b0000 pid=3014 execve guuid=8d2fd223-1a00-0000-aeaa-a04dc70b0000 pid=3015 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=8d2fd223-1a00-0000-aeaa-a04dc70b0000 pid=3015 clone guuid=7144e023-1a00-0000-aeaa-a04dc80b0000 pid=3016 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=7144e023-1a00-0000-aeaa-a04dc80b0000 pid=3016 execve guuid=69241b2a-1a00-0000-aeaa-a04dc90b0000 pid=3017 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=69241b2a-1a00-0000-aeaa-a04dc90b0000 pid=3017 execve guuid=2eaf642a-1a00-0000-aeaa-a04dca0b0000 pid=3018 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=2eaf642a-1a00-0000-aeaa-a04dca0b0000 pid=3018 clone guuid=c3b4702a-1a00-0000-aeaa-a04dcb0b0000 pid=3019 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=c3b4702a-1a00-0000-aeaa-a04dcb0b0000 pid=3019 execve guuid=93541132-1a00-0000-aeaa-a04dde0b0000 pid=3038 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=93541132-1a00-0000-aeaa-a04dde0b0000 pid=3038 execve guuid=cfdb4c32-1a00-0000-aeaa-a04de00b0000 pid=3040 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=cfdb4c32-1a00-0000-aeaa-a04de00b0000 pid=3040 clone guuid=75b05232-1a00-0000-aeaa-a04de10b0000 pid=3041 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=75b05232-1a00-0000-aeaa-a04de10b0000 pid=3041 execve guuid=d1cbb835-1a00-0000-aeaa-a04dec0b0000 pid=3052 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=d1cbb835-1a00-0000-aeaa-a04dec0b0000 pid=3052 execve guuid=5d6dfc35-1a00-0000-aeaa-a04dee0b0000 pid=3054 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=5d6dfc35-1a00-0000-aeaa-a04dee0b0000 pid=3054 clone guuid=ff820a36-1a00-0000-aeaa-a04def0b0000 pid=3055 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=ff820a36-1a00-0000-aeaa-a04def0b0000 pid=3055 execve guuid=71c9ec39-1a00-0000-aeaa-a04dff0b0000 pid=3071 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=71c9ec39-1a00-0000-aeaa-a04dff0b0000 pid=3071 execve guuid=d695343a-1a00-0000-aeaa-a04d010c0000 pid=3073 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=d695343a-1a00-0000-aeaa-a04d010c0000 pid=3073 clone guuid=3309413a-1a00-0000-aeaa-a04d020c0000 pid=3074 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=3309413a-1a00-0000-aeaa-a04d020c0000 pid=3074 execve guuid=23ecb33d-1a00-0000-aeaa-a04d100c0000 pid=3088 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=23ecb33d-1a00-0000-aeaa-a04d100c0000 pid=3088 execve guuid=51dc153e-1a00-0000-aeaa-a04d110c0000 pid=3089 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=51dc153e-1a00-0000-aeaa-a04d110c0000 pid=3089 clone guuid=efc8233e-1a00-0000-aeaa-a04d120c0000 pid=3090 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=efc8233e-1a00-0000-aeaa-a04d120c0000 pid=3090 execve guuid=815fdf42-1a00-0000-aeaa-a04d200c0000 pid=3104 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=815fdf42-1a00-0000-aeaa-a04d200c0000 pid=3104 execve guuid=66922243-1a00-0000-aeaa-a04d210c0000 pid=3105 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=66922243-1a00-0000-aeaa-a04d210c0000 pid=3105 clone guuid=b3e63243-1a00-0000-aeaa-a04d220c0000 pid=3106 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=b3e63243-1a00-0000-aeaa-a04d220c0000 pid=3106 execve guuid=322ef449-1a00-0000-aeaa-a04d360c0000 pid=3126 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=322ef449-1a00-0000-aeaa-a04d360c0000 pid=3126 execve guuid=d64c4f4a-1a00-0000-aeaa-a04d380c0000 pid=3128 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=d64c4f4a-1a00-0000-aeaa-a04d380c0000 pid=3128 clone guuid=df006d4a-1a00-0000-aeaa-a04d390c0000 pid=3129 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=df006d4a-1a00-0000-aeaa-a04d390c0000 pid=3129 execve guuid=d93e3153-1a00-0000-aeaa-a04d510c0000 pid=3153 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=d93e3153-1a00-0000-aeaa-a04d510c0000 pid=3153 execve guuid=36de9553-1a00-0000-aeaa-a04d530c0000 pid=3155 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=36de9553-1a00-0000-aeaa-a04d530c0000 pid=3155 clone guuid=373aab53-1a00-0000-aeaa-a04d550c0000 pid=3157 /usr/bin/curl net send-data guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=373aab53-1a00-0000-aeaa-a04d550c0000 pid=3157 execve guuid=74ddf659-1a00-0000-aeaa-a04d640c0000 pid=3172 /usr/bin/chmod guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=74ddf659-1a00-0000-aeaa-a04d640c0000 pid=3172 execve guuid=6952365a-1a00-0000-aeaa-a04d660c0000 pid=3174 /usr/bin/dash guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=6952365a-1a00-0000-aeaa-a04d660c0000 pid=3174 clone guuid=44e13d5a-1a00-0000-aeaa-a04d670c0000 pid=3175 /usr/bin/rm delete-file guuid=82903407-1a00-0000-aeaa-a04d8c0b0000 pid=2956->guuid=44e13d5a-1a00-0000-aeaa-a04d670c0000 pid=3175 execve fc577216-6857-5e80-aeaf-7ca7103e91b9 161.97.149.138:80 guuid=07fb9507-1a00-0000-aeaa-a04d8d0b0000 pid=2957->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 90B guuid=3ef48a15-1a00-0000-aeaa-a04da70b0000 pid=2983->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 91B guuid=d4d3551a-1a00-0000-aeaa-a04db00b0000 pid=2992->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 91B guuid=7144e023-1a00-0000-aeaa-a04dc80b0000 pid=3016->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 91B guuid=c3b4702a-1a00-0000-aeaa-a04dcb0b0000 pid=3019->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 91B guuid=75b05232-1a00-0000-aeaa-a04de10b0000 pid=3041->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 91B guuid=ff820a36-1a00-0000-aeaa-a04def0b0000 pid=3055->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 91B guuid=3309413a-1a00-0000-aeaa-a04d020c0000 pid=3074->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 90B guuid=efc8233e-1a00-0000-aeaa-a04d120c0000 pid=3090->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 90B guuid=b3e63243-1a00-0000-aeaa-a04d220c0000 pid=3106->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 90B guuid=df006d4a-1a00-0000-aeaa-a04d390c0000 pid=3129->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 90B guuid=373aab53-1a00-0000-aeaa-a04d550c0000 pid=3157->fc577216-6857-5e80-aeaf-7ca7103e91b9 send: 93B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-09-29 17:13:32 UTC
File Type:
Text (Shell)
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh efc7d25ea48997d056352f9f02883ee0d88fcbf565b74f57499fbb02d7d0284a

(this sample)

  
Delivery method
Distributed via web download

Comments