MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f144c424ed9a4cfea0221b5b1e676f3f410398163de311a60861532cabef916d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: f144c424ed9a4cfea0221b5b1e676f3f410398163de311a60861532cabef916d
SHA3-384 hash: e67720640af6a03722f1b34bd19ee8ca1f57152192e8843ab5a68355de58884384f8020e265c8c0faf4a2bca3860b056
SHA1 hash: 007e0751aa90455ef96de36560f23138ce05b6c7
MD5 hash: f07731b870001699ca8834e3963842a4
humanhash: mockingbird-venus-orange-pennsylvania
File name:plc
Download: download sample
Signature Mirai
File size:287 bytes
First seen:2025-12-21 15:13:52 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:LyLCNwAK7Pi+BFKVyLAWJNwAbJ78Ji+BFKVyLmSaqA3LKf9A+62:OJAn+FK0zTwA2vFK0mSaqA3LKd
TLSH T1EBD086CE50105670618FAC5831715F4E6881578D31601F885CCF607BD5CCA25E35C630
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.64/zermips0fc47e51b950d0c9feef18299d94898980682002b327e5604c86c6ea9ba51ebc Miraielf mirai ua-wget
http://130.12.180.64/zermpslbad8bf32d2d85ab9261f2236de947c154db5f19a9967c687c8e98a9e23e6d7fe Miraielf mirai ua-wget
http://130.12.180.64/zerarm7bd93f3b53d2702bddb071a835ced4d7e9ba493d72331cd651307ad78da154e74 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-21T12:37:00Z UTC
Last seen:
2025-12-22T14:52:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=420fe8dd-1900-0000-170c-0b00650c0000 pid=3173 /usr/bin/sudo guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174 /tmp/sample.bin guuid=420fe8dd-1900-0000-170c-0b00650c0000 pid=3173->guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174 execve guuid=a20868e1-1900-0000-170c-0b00670c0000 pid=3175 /usr/bin/busybox net send-data write-file guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=a20868e1-1900-0000-170c-0b00670c0000 pid=3175 execve guuid=829759e5-1900-0000-170c-0b00700c0000 pid=3184 /usr/bin/chmod guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=829759e5-1900-0000-170c-0b00700c0000 pid=3184 execve guuid=1d62a5e5-1900-0000-170c-0b00720c0000 pid=3186 /usr/bin/dash guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=1d62a5e5-1900-0000-170c-0b00720c0000 pid=3186 clone guuid=89779ce6-1900-0000-170c-0b00740c0000 pid=3188 /usr/bin/busybox net send-data write-file guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=89779ce6-1900-0000-170c-0b00740c0000 pid=3188 execve guuid=ce4bc1e9-1900-0000-170c-0b00790c0000 pid=3193 /usr/bin/chmod guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=ce4bc1e9-1900-0000-170c-0b00790c0000 pid=3193 execve guuid=9a10f7e9-1900-0000-170c-0b007b0c0000 pid=3195 /usr/bin/dash guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=9a10f7e9-1900-0000-170c-0b007b0c0000 pid=3195 clone guuid=51946cea-1900-0000-170c-0b007f0c0000 pid=3199 /usr/bin/busybox net send-data write-file guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=51946cea-1900-0000-170c-0b007f0c0000 pid=3199 execve guuid=8cde6ced-1900-0000-170c-0b00890c0000 pid=3209 /usr/bin/chmod guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=8cde6ced-1900-0000-170c-0b00890c0000 pid=3209 execve guuid=42e2a8ed-1900-0000-170c-0b008a0c0000 pid=3210 /usr/bin/dash guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=42e2a8ed-1900-0000-170c-0b008a0c0000 pid=3210 clone guuid=ab4340ee-1900-0000-170c-0b008d0c0000 pid=3213 /usr/bin/rm guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=ab4340ee-1900-0000-170c-0b008d0c0000 pid=3213 execve guuid=dc2977ee-1900-0000-170c-0b008e0c0000 pid=3214 /usr/bin/rm guuid=552819e1-1900-0000-170c-0b00660c0000 pid=3174->guuid=dc2977ee-1900-0000-170c-0b008e0c0000 pid=3214 execve f22fee75-ab34-540d-95fe-696883c6f4ad 130.12.180.64:80 guuid=a20868e1-1900-0000-170c-0b00670c0000 pid=3175->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B guuid=89779ce6-1900-0000-170c-0b00740c0000 pid=3188->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B guuid=51946cea-1900-0000-170c-0b007f0c0000 pid=3199->f22fee75-ab34-540d-95fe-696883c6f4ad send: 83B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-12-21 15:32:17 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f144c424ed9a4cfea0221b5b1e676f3f410398163de311a60861532cabef916d

(this sample)

  
Delivery method
Distributed via web download

Comments