MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f303eb057972dba34707064f9e29f9151ec3b3ec3cb4fe25864ebd7ca959dfb4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: f303eb057972dba34707064f9e29f9151ec3b3ec3cb4fe25864ebd7ca959dfb4
SHA3-384 hash: 7d66474479ed0927787c80b2e1787ee35783aceac5b8c85255e2fc1f83690e1e558d0b04635ba6d7ece2cf9031769fbb
SHA1 hash: e0ab19ed556c5bb19a90b37da19707b542c63fc3
MD5 hash: 3bfbebc8c28faf4852555f4ddd6761d5
humanhash: july-gee-speaker-montana
File name:wget.sh
Download: download sample
Signature Mirai
File size:771 bytes
First seen:2025-11-23 10:37:45 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:qLKw6o9oCkFUATkQUWqTCU6/bQpA6tEOXt:PApkzTkQmTCgZrXt
TLSH T17901DBCA7B527EB10CACEE357E62482C4150468D1D7B0BECBC4D057E44D1B92F155F49
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://141.98.6.51/arcac8270387befdd1835141bdc8f8211929c0d3bc68ebf6371774e70c17a9e57b8 Miraielf ua-wget
http://141.98.6.51/arm307f4a7e196a88fdfcae5a971d64b9899428b390e78f595392c7624797cbc01d Miraielf mirai ua-wget
http://141.98.6.51/arm549b78f52a03f7d2bc0e1d38eb4ab91e39e7f76418cb4064115ecff116de8c952 Miraielf mirai ua-wget
http://141.98.6.51/arm74057d50aba1aeda1f359ce366f336e5818faf223fdb81048595a0535e3b3155e Miraielf mirai ua-wget
http://141.98.6.51/mipsee559d55a51ca6b6e3997e4e211281240ecba60ff501c43fc1f3a4060bc618cf Miraielf gafgyt ua-wget
http://141.98.6.51/mpsl0f374086e4c202ad867cbe9a4b3aacd93139cbc175f71e7ab177b866d46e4b60 Miraielf mirai ua-wget
http://141.98.6.51/ppc9ad5093aeff220adc4b2194596da4dd6edd0c2311c2f0361611602022493bf0b Miraielf mirai ua-wget
http://141.98.6.51/sh4882a0ea7a6a427db4300014caad9e4a0ba6fba427f12dd91eff34fbc05231837 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-11-23T08:48:00Z UTC
Last seen:
2025-11-24T07:34:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=9487b031-1a00-0000-eac1-6c04f1090000 pid=2545 /usr/bin/sudo guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550 /tmp/sample.bin guuid=9487b031-1a00-0000-eac1-6c04f1090000 pid=2545->guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550 execve guuid=d7f52434-1a00-0000-eac1-6c04f8090000 pid=2552 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=d7f52434-1a00-0000-eac1-6c04f8090000 pid=2552 execve guuid=75cbac40-1a00-0000-eac1-6c04180a0000 pid=2584 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=75cbac40-1a00-0000-eac1-6c04180a0000 pid=2584 execve guuid=1839ed40-1a00-0000-eac1-6c041a0a0000 pid=2586 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=1839ed40-1a00-0000-eac1-6c041a0a0000 pid=2586 clone guuid=8d9d4e42-1a00-0000-eac1-6c04200a0000 pid=2592 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=8d9d4e42-1a00-0000-eac1-6c04200a0000 pid=2592 execve guuid=6e65ac42-1a00-0000-eac1-6c04220a0000 pid=2594 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=6e65ac42-1a00-0000-eac1-6c04220a0000 pid=2594 execve guuid=fe19504c-1a00-0000-eac1-6c04420a0000 pid=2626 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=fe19504c-1a00-0000-eac1-6c04420a0000 pid=2626 execve guuid=6c39d14c-1a00-0000-eac1-6c04440a0000 pid=2628 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=6c39d14c-1a00-0000-eac1-6c04440a0000 pid=2628 clone guuid=5234b64e-1a00-0000-eac1-6c044b0a0000 pid=2635 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=5234b64e-1a00-0000-eac1-6c044b0a0000 pid=2635 execve guuid=4810fa4e-1a00-0000-eac1-6c044d0a0000 pid=2637 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=4810fa4e-1a00-0000-eac1-6c044d0a0000 pid=2637 execve guuid=b705c658-1a00-0000-eac1-6c04670a0000 pid=2663 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=b705c658-1a00-0000-eac1-6c04670a0000 pid=2663 execve guuid=3a363b59-1a00-0000-eac1-6c046a0a0000 pid=2666 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=3a363b59-1a00-0000-eac1-6c046a0a0000 pid=2666 clone guuid=91d5275b-1a00-0000-eac1-6c04700a0000 pid=2672 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=91d5275b-1a00-0000-eac1-6c04700a0000 pid=2672 execve guuid=f0a79d5b-1a00-0000-eac1-6c04720a0000 pid=2674 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=f0a79d5b-1a00-0000-eac1-6c04720a0000 pid=2674 execve guuid=31888c67-1a00-0000-eac1-6c04960a0000 pid=2710 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=31888c67-1a00-0000-eac1-6c04960a0000 pid=2710 execve guuid=9317f467-1a00-0000-eac1-6c04980a0000 pid=2712 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=9317f467-1a00-0000-eac1-6c04980a0000 pid=2712 clone guuid=f209dd69-1a00-0000-eac1-6c04a00a0000 pid=2720 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=f209dd69-1a00-0000-eac1-6c04a00a0000 pid=2720 execve guuid=28f6526a-1a00-0000-eac1-6c04a20a0000 pid=2722 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=28f6526a-1a00-0000-eac1-6c04a20a0000 pid=2722 execve guuid=8e59917a-1a00-0000-eac1-6c04cc0a0000 pid=2764 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=8e59917a-1a00-0000-eac1-6c04cc0a0000 pid=2764 execve guuid=46e4ee7a-1a00-0000-eac1-6c04ce0a0000 pid=2766 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=46e4ee7a-1a00-0000-eac1-6c04ce0a0000 pid=2766 clone guuid=ef0d797b-1a00-0000-eac1-6c04d10a0000 pid=2769 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=ef0d797b-1a00-0000-eac1-6c04d10a0000 pid=2769 execve guuid=59fceb7b-1a00-0000-eac1-6c04d40a0000 pid=2772 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=59fceb7b-1a00-0000-eac1-6c04d40a0000 pid=2772 execve guuid=87f9f487-1a00-0000-eac1-6c04e70a0000 pid=2791 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=87f9f487-1a00-0000-eac1-6c04e70a0000 pid=2791 execve guuid=67ac3b88-1a00-0000-eac1-6c04e80a0000 pid=2792 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=67ac3b88-1a00-0000-eac1-6c04e80a0000 pid=2792 clone guuid=f86bc688-1a00-0000-eac1-6c04ea0a0000 pid=2794 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=f86bc688-1a00-0000-eac1-6c04ea0a0000 pid=2794 execve guuid=ca758389-1a00-0000-eac1-6c04ed0a0000 pid=2797 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=ca758389-1a00-0000-eac1-6c04ed0a0000 pid=2797 execve guuid=a2d68a94-1a00-0000-eac1-6c04030b0000 pid=2819 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=a2d68a94-1a00-0000-eac1-6c04030b0000 pid=2819 execve guuid=8ebfde94-1a00-0000-eac1-6c04050b0000 pid=2821 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=8ebfde94-1a00-0000-eac1-6c04050b0000 pid=2821 clone guuid=57d70096-1a00-0000-eac1-6c04080b0000 pid=2824 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=57d70096-1a00-0000-eac1-6c04080b0000 pid=2824 execve guuid=8d6d4a96-1a00-0000-eac1-6c04090b0000 pid=2825 /usr/bin/busybox net send-data write-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=8d6d4a96-1a00-0000-eac1-6c04090b0000 pid=2825 execve guuid=15b0bea0-1a00-0000-eac1-6c04180b0000 pid=2840 /usr/bin/chmod guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=15b0bea0-1a00-0000-eac1-6c04180b0000 pid=2840 execve guuid=9ca524a1-1a00-0000-eac1-6c04190b0000 pid=2841 /usr/bin/dash guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=9ca524a1-1a00-0000-eac1-6c04190b0000 pid=2841 clone guuid=83fd25a2-1a00-0000-eac1-6c041c0b0000 pid=2844 /usr/bin/rm delete-file guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=83fd25a2-1a00-0000-eac1-6c041c0b0000 pid=2844 execve guuid=f5e663a2-1a00-0000-eac1-6c041e0b0000 pid=2846 /usr/bin/rm guuid=619bad33-1a00-0000-eac1-6c04f6090000 pid=2550->guuid=f5e663a2-1a00-0000-eac1-6c041e0b0000 pid=2846 execve f258748b-c5ad-5ecb-b901-a3b7bfd87c4d 141.98.6.51:80 guuid=d7f52434-1a00-0000-eac1-6c04f8090000 pid=2552->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 77B guuid=6e65ac42-1a00-0000-eac1-6c04220a0000 pid=2594->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 77B guuid=4810fa4e-1a00-0000-eac1-6c044d0a0000 pid=2637->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B guuid=f0a79d5b-1a00-0000-eac1-6c04720a0000 pid=2674->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B guuid=28f6526a-1a00-0000-eac1-6c04a20a0000 pid=2722->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B guuid=59fceb7b-1a00-0000-eac1-6c04d40a0000 pid=2772->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B guuid=ca758389-1a00-0000-eac1-6c04ed0a0000 pid=2797->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 77B guuid=8d6d4a96-1a00-0000-eac1-6c04090b0000 pid=2825->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 77B
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-11-23 10:22:14 UTC
File Type:
Text (Shell)
AV detection:
14 of 24 (58.33%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (19055) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f303eb057972dba34707064f9e29f9151ec3b3ec3cb4fe25864ebd7ca959dfb4

(this sample)

  
Delivery method
Distributed via web download

Comments