MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f4bce3038fad655a0d11ca7cf7700ce5d3374e3b7965ce7b52fc5f005514b544. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: f4bce3038fad655a0d11ca7cf7700ce5d3374e3b7965ce7b52fc5f005514b544
SHA3-384 hash: 06bf1652fd78e134991545161fb41538c75070ee68b7936d4a3d42c9c36e18852c96e38e76b85f6b92879a60800ae7e8
SHA1 hash: 5e20284a47d653fe9802c1635c002452d62dda24
MD5 hash: de84a7add7ae9c13a8051449086f2d95
humanhash: quebec-shade-east-failed
File name:curl.sh
Download: download sample
Signature Mirai
File size:667 bytes
First seen:2025-11-23 10:40:09 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:97NjEKwpd9ohjFUIaQUqETCUbStcp1Qr4dtEOXG:xMmiQUTCstourXG
TLSH T1E8014C996B12BDF30A2CFF36B671464D0150C18D59BF0790FC21083DC8E1642B195B56
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://141.98.6.51/arcn/an/aelf ua-wget
http://141.98.6.51/arm307f4a7e196a88fdfcae5a971d64b9899428b390e78f595392c7624797cbc01d Miraielf mirai ua-wget
http://141.98.6.51/arm549b78f52a03f7d2bc0e1d38eb4ab91e39e7f76418cb4064115ecff116de8c952 Miraielf mirai ua-wget
http://141.98.6.51/arm74057d50aba1aeda1f359ce366f336e5818faf223fdb81048595a0535e3b3155e Miraielf mirai ua-wget
http://141.98.6.51/mipsee559d55a51ca6b6e3997e4e211281240ecba60ff501c43fc1f3a4060bc618cf Miraielf gafgyt ua-wget
http://141.98.6.51/mpsl0f374086e4c202ad867cbe9a4b3aacd93139cbc175f71e7ab177b866d46e4b60 Miraielf mirai ua-wget
http://141.98.6.51/ppc9ad5093aeff220adc4b2194596da4dd6edd0c2311c2f0361611602022493bf0b Miraielf mirai ua-wget
http://141.98.6.51/sh4882a0ea7a6a427db4300014caad9e4a0ba6fba427f12dd91eff34fbc05231837 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Result
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-11-23T08:50:00Z UTC
Last seen:
2025-11-23T10:29:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=bf214c59-1d00-0000-c1a1-f54e1d070000 pid=1821 /usr/bin/sudo guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828 /tmp/sample.bin guuid=bf214c59-1d00-0000-c1a1-f54e1d070000 pid=1821->guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828 execve guuid=59d8ee5b-1d00-0000-c1a1-f54e25070000 pid=1829 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=59d8ee5b-1d00-0000-c1a1-f54e25070000 pid=1829 execve guuid=e4cf686c-1d00-0000-c1a1-f54e3e070000 pid=1854 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=e4cf686c-1d00-0000-c1a1-f54e3e070000 pid=1854 execve guuid=0a01b16c-1d00-0000-c1a1-f54e40070000 pid=1856 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=0a01b16c-1d00-0000-c1a1-f54e40070000 pid=1856 clone guuid=d779476d-1d00-0000-c1a1-f54e44070000 pid=1860 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=d779476d-1d00-0000-c1a1-f54e44070000 pid=1860 execve guuid=471cfa6d-1d00-0000-c1a1-f54e47070000 pid=1863 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=471cfa6d-1d00-0000-c1a1-f54e47070000 pid=1863 execve guuid=9b8d3f7c-1d00-0000-c1a1-f54e69070000 pid=1897 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=9b8d3f7c-1d00-0000-c1a1-f54e69070000 pid=1897 execve guuid=30a48c7c-1d00-0000-c1a1-f54e6b070000 pid=1899 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=30a48c7c-1d00-0000-c1a1-f54e6b070000 pid=1899 clone guuid=7fb5477d-1d00-0000-c1a1-f54e6f070000 pid=1903 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=7fb5477d-1d00-0000-c1a1-f54e6f070000 pid=1903 execve guuid=3648907d-1d00-0000-c1a1-f54e70070000 pid=1904 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=3648907d-1d00-0000-c1a1-f54e70070000 pid=1904 execve guuid=dfe2a68b-1d00-0000-c1a1-f54e86070000 pid=1926 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=dfe2a68b-1d00-0000-c1a1-f54e86070000 pid=1926 execve guuid=67ed1a8c-1d00-0000-c1a1-f54e88070000 pid=1928 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=67ed1a8c-1d00-0000-c1a1-f54e88070000 pid=1928 clone guuid=cda9a48c-1d00-0000-c1a1-f54e8b070000 pid=1931 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=cda9a48c-1d00-0000-c1a1-f54e8b070000 pid=1931 execve guuid=a7acea8c-1d00-0000-c1a1-f54e8c070000 pid=1932 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=a7acea8c-1d00-0000-c1a1-f54e8c070000 pid=1932 execve guuid=c5c1f89e-1d00-0000-c1a1-f54eae070000 pid=1966 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=c5c1f89e-1d00-0000-c1a1-f54eae070000 pid=1966 execve guuid=26ae519f-1d00-0000-c1a1-f54eaf070000 pid=1967 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=26ae519f-1d00-0000-c1a1-f54eaf070000 pid=1967 clone guuid=55bd05a0-1d00-0000-c1a1-f54eb1070000 pid=1969 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=55bd05a0-1d00-0000-c1a1-f54eb1070000 pid=1969 execve guuid=0b3461a0-1d00-0000-c1a1-f54eb2070000 pid=1970 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=0b3461a0-1d00-0000-c1a1-f54eb2070000 pid=1970 execve guuid=62c3b5b0-1d00-0000-c1a1-f54ece070000 pid=1998 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=62c3b5b0-1d00-0000-c1a1-f54ece070000 pid=1998 execve guuid=7c8610b1-1d00-0000-c1a1-f54ecf070000 pid=1999 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=7c8610b1-1d00-0000-c1a1-f54ecf070000 pid=1999 clone guuid=fa975ab3-1d00-0000-c1a1-f54ed1070000 pid=2001 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=fa975ab3-1d00-0000-c1a1-f54ed1070000 pid=2001 execve guuid=dec3b6b3-1d00-0000-c1a1-f54ed2070000 pid=2002 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=dec3b6b3-1d00-0000-c1a1-f54ed2070000 pid=2002 execve guuid=694e35c4-1d00-0000-c1a1-f54eda070000 pid=2010 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=694e35c4-1d00-0000-c1a1-f54eda070000 pid=2010 execve guuid=5074b2c4-1d00-0000-c1a1-f54edb070000 pid=2011 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=5074b2c4-1d00-0000-c1a1-f54edb070000 pid=2011 clone guuid=b74268c5-1d00-0000-c1a1-f54edf070000 pid=2015 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=b74268c5-1d00-0000-c1a1-f54edf070000 pid=2015 execve guuid=0e7cccc5-1d00-0000-c1a1-f54ee1070000 pid=2017 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=0e7cccc5-1d00-0000-c1a1-f54ee1070000 pid=2017 execve guuid=da1286d3-1d00-0000-c1a1-f54ef7070000 pid=2039 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=da1286d3-1d00-0000-c1a1-f54ef7070000 pid=2039 execve guuid=efa0c6d3-1d00-0000-c1a1-f54ef9070000 pid=2041 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=efa0c6d3-1d00-0000-c1a1-f54ef9070000 pid=2041 clone guuid=448442d4-1d00-0000-c1a1-f54efc070000 pid=2044 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=448442d4-1d00-0000-c1a1-f54efc070000 pid=2044 execve guuid=ed7e85d4-1d00-0000-c1a1-f54efd070000 pid=2045 /usr/bin/curl net send-data write-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=ed7e85d4-1d00-0000-c1a1-f54efd070000 pid=2045 execve guuid=c64541e2-1d00-0000-c1a1-f54e18080000 pid=2072 /usr/bin/chmod guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=c64541e2-1d00-0000-c1a1-f54e18080000 pid=2072 execve guuid=66019be2-1d00-0000-c1a1-f54e1a080000 pid=2074 /usr/bin/dash guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=66019be2-1d00-0000-c1a1-f54e1a080000 pid=2074 clone guuid=ffd052e3-1d00-0000-c1a1-f54e1d080000 pid=2077 /usr/bin/rm delete-file guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=ffd052e3-1d00-0000-c1a1-f54e1d080000 pid=2077 execve guuid=e754b1e3-1d00-0000-c1a1-f54e20080000 pid=2080 /usr/bin/rm guuid=12b28d5b-1d00-0000-c1a1-f54e24070000 pid=1828->guuid=e754b1e3-1d00-0000-c1a1-f54e20080000 pid=2080 execve f258748b-c5ad-5ecb-b901-a3b7bfd87c4d 141.98.6.51:80 guuid=59d8ee5b-1d00-0000-c1a1-f54e25070000 pid=1829->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B guuid=471cfa6d-1d00-0000-c1a1-f54e47070000 pid=1863->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B guuid=3648907d-1d00-0000-c1a1-f54e70070000 pid=1904->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 79B guuid=a7acea8c-1d00-0000-c1a1-f54e8c070000 pid=1932->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 79B guuid=0b3461a0-1d00-0000-c1a1-f54eb2070000 pid=1970->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 79B guuid=dec3b6b3-1d00-0000-c1a1-f54ed2070000 pid=2002->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 79B guuid=0e7cccc5-1d00-0000-c1a1-f54ee1070000 pid=2017->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B guuid=ed7e85d4-1d00-0000-c1a1-f54efd070000 pid=2045->f258748b-c5ad-5ecb-b901-a3b7bfd87c4d send: 78B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-11-23 10:22:25 UTC
File Type:
Text (Shell)
AV detection:
7 of 36 (19.44%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (21775) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f4bce3038fad655a0d11ca7cf7700ce5d3374e3b7965ce7b52fc5f005514b544

(this sample)

  
Delivery method
Distributed via web download

Comments