MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2f39f30cf80dce275554841c2aa33ca17634a0eacb0c804c9a0c3eb9ad5f7cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: f2f39f30cf80dce275554841c2aa33ca17634a0eacb0c804c9a0c3eb9ad5f7cc
SHA3-384 hash: a0549d395b8ee7380f303762dcb3374cc81cf13b98a8a29fd4ccd8bfd07c20307eb6fc5975683c8e0cacde3c6165bcd3
SHA1 hash: 67cb4332cbe78c64761a6171b84fafa01d61fbbf
MD5 hash: d88b8e7598708fe0ca6b59902ba60d04
humanhash: three-red-timing-double
File name:o.xml
Download: download sample
Signature Mirai
File size:733 bytes
First seen:2025-07-09 08:51:18 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:FH8ioNJAC7ukxGWi2jU30+0K5+A+MjRrZG3Bc5ZhG+E6:FH8j/wWi2jz8FZG3u
TLSH T12601D66DE2A89A4205B5C5C7B5F04506C440D0CFE2AF57E9F68D092A6F28C5E345320D
Magika xml
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.138.16.35/bins/morte.x86491501ada8e776460fee2439203f5d607de9094202f32fa549f3a4fbaabaa9c1 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=7be0a224-1900-0000-972f-51226d090000 pid=2413 /usr/bin/sudo guuid=61598c27-1900-0000-972f-512273090000 pid=2419 /tmp/sample.bin guuid=7be0a224-1900-0000-972f-51226d090000 pid=2413->guuid=61598c27-1900-0000-972f-512273090000 pid=2419 execve guuid=1949d227-1900-0000-972f-512274090000 pid=2420 /usr/bin/dash guuid=61598c27-1900-0000-972f-512273090000 pid=2419->guuid=1949d227-1900-0000-972f-512274090000 pid=2420 clone guuid=1bcfe627-1900-0000-972f-512276090000 pid=2422 /usr/bin/dash guuid=61598c27-1900-0000-972f-512273090000 pid=2419->guuid=1bcfe627-1900-0000-972f-512276090000 pid=2422 clone guuid=7878f927-1900-0000-972f-512277090000 pid=2423 /usr/bin/curl net send-data write-file guuid=61598c27-1900-0000-972f-512273090000 pid=2419->guuid=7878f927-1900-0000-972f-512277090000 pid=2423 execve guuid=ee736a34-1900-0000-972f-512298090000 pid=2456 /usr/bin/wget net send-data write-file guuid=61598c27-1900-0000-972f-512273090000 pid=2419->guuid=ee736a34-1900-0000-972f-512298090000 pid=2456 execve guuid=682bd83a-1900-0000-972f-5122a9090000 pid=2473 /usr/bin/chmod guuid=61598c27-1900-0000-972f-512273090000 pid=2419->guuid=682bd83a-1900-0000-972f-5122a9090000 pid=2473 execve guuid=e1cd143b-1900-0000-972f-5122ab090000 pid=2475 /home/sandbox/morte.x86 net guuid=61598c27-1900-0000-972f-512273090000 pid=2419->guuid=e1cd143b-1900-0000-972f-5122ab090000 pid=2475 execve e4e03298-99ea-5528-be32-6d1c712fc916 45.138.16.35:80 guuid=7878f927-1900-0000-972f-512277090000 pid=2423->e4e03298-99ea-5528-be32-6d1c712fc916 send: 90B guuid=ee736a34-1900-0000-972f-512298090000 pid=2456->e4e03298-99ea-5528-be32-6d1c712fc916 send: 141B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=e1cd143b-1900-0000-972f-5122ab090000 pid=2475->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=be1e8b3b-1900-0000-972f-5122ae090000 pid=2478 /home/sandbox/morte.x86 guuid=e1cd143b-1900-0000-972f-5122ab090000 pid=2475->guuid=be1e8b3b-1900-0000-972f-5122ae090000 pid=2478 clone guuid=4b0e8f3b-1900-0000-972f-5122af090000 pid=2479 /home/sandbox/morte.x86 delete-file dns net send-data zombie guuid=e1cd143b-1900-0000-972f-5122ab090000 pid=2475->guuid=4b0e8f3b-1900-0000-972f-5122af090000 pid=2479 clone guuid=4b0e8f3b-1900-0000-972f-5122af090000 pid=2479->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 930B 96fddf7d-a0d8-5efa-9fe5-4b09baec8f67 cnnetwork.uk:12121 guuid=4b0e8f3b-1900-0000-972f-5122af090000 pid=2479->96fddf7d-a0d8-5efa-9fe5-4b09baec8f67 send: 465B guuid=64f0993b-1900-0000-972f-5122b0090000 pid=2480 /home/sandbox/morte.x86 guuid=4b0e8f3b-1900-0000-972f-5122af090000 pid=2479->guuid=64f0993b-1900-0000-972f-5122b0090000 pid=2480 clone
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-07-09 08:54:16 UTC
File Type:
Text
AV detection:
5 of 38 (13.16%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f2f39f30cf80dce275554841c2aa33ca17634a0eacb0c804c9a0c3eb9ad5f7cc

(this sample)

  
Delivery method
Distributed via web download

Comments