MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f4fd8959c0e558e9c56dbcf0cf3afdf685238aa24a4904bdf1436d8e81cffea4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f4fd8959c0e558e9c56dbcf0cf3afdf685238aa24a4904bdf1436d8e81cffea4
SHA3-384 hash: 8898184080d14987d05f90ca82251051e687642d4cc64988c17328b338d2821845d8c9f5246a43e73190de6a3c65bb04
SHA1 hash: 1d9344c832e79635f5785ece34e6a472c89bdc94
MD5 hash: 32828fa40819458ab67090045fc5dac2
humanhash: fourteen-bravo-don-finch
File name:curl.sh
Download: download sample
Signature Mirai
File size:698 bytes
First seen:2025-12-21 09:31:50 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KhI5W3CtI1/TbNn4BwBtnV1npLOhcnHF26npliAE/nUqlHWnioJi5nF3bQA:KOQyS1bbd4BsV1npLO6HFbpliAcUqlCU
TLSH T114012D8D41845B63A38C9C6FBBD3506E0660E2C911663B90B7D546A986C47C9B74C972
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://130.12.180.48/arm45168bc663329c3b1d883b83a59fe84f08b6e01895c37144ddfa9156bea3eaee Mirai32-bit elf mirai Mozi
http://130.12.180.48/arm5c081b0cb0bf6317b1c5a57c3c6c821afc9656185960865bece92b13f5da8817a Miraicensys elf mirai ua-wget
http://130.12.180.48/arm725d009b54cc805f0e3f69e011da81239bfb6422877c1574d62e0fbc988eab49a Miraicensys elf mirai ua-wget
http://130.12.180.48/mipsa04ede576aa16c227ad500289a8c66fdd19fdbff2697ece9a24705418b42b9e0 Mirai32-bit elf mirai Mozi
http://130.12.180.48/mpsl25f528c64b08f744661e0a347d6f8152fa9b76e2f62f42c2351539186cc1dcde Gafgytcensys elf gafgyt ua-wget
http://130.12.180.48/arcb6ee760b9fbfe272a0013850886a8e4e0b4fd824fb44b2a038ce187e8126dece Miraicensys elf mirai ua-wget
http://130.12.180.48/aarch6469008b5e7815c51d3b6d26bb29ebdd82057ee1c853b0368111bd47a3f145ba5f Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-21T06:54:00Z UTC
Last seen:
2025-12-22T13:23:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=6eeb94e2-1a00-0000-2092-c7f0470b0000 pid=2887 /usr/bin/sudo guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894 /tmp/sample.bin guuid=6eeb94e2-1a00-0000-2092-c7f0470b0000 pid=2887->guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894 execve guuid=b99febe4-1a00-0000-2092-c7f0500b0000 pid=2896 /usr/bin/rm guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=b99febe4-1a00-0000-2092-c7f0500b0000 pid=2896 execve guuid=e1f960e5-1a00-0000-2092-c7f0520b0000 pid=2898 /usr/bin/rm guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=e1f960e5-1a00-0000-2092-c7f0520b0000 pid=2898 execve guuid=8517d3e5-1a00-0000-2092-c7f0540b0000 pid=2900 /usr/bin/rm guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=8517d3e5-1a00-0000-2092-c7f0540b0000 pid=2900 execve guuid=d22e39e6-1a00-0000-2092-c7f0550b0000 pid=2901 /usr/bin/rm guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=d22e39e6-1a00-0000-2092-c7f0550b0000 pid=2901 execve guuid=a644bde6-1a00-0000-2092-c7f0560b0000 pid=2902 /usr/bin/rm guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=a644bde6-1a00-0000-2092-c7f0560b0000 pid=2902 execve guuid=7eb6eee6-1a00-0000-2092-c7f0580b0000 pid=2904 /usr/bin/rm guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=7eb6eee6-1a00-0000-2092-c7f0580b0000 pid=2904 execve guuid=174d2be7-1a00-0000-2092-c7f0590b0000 pid=2905 /usr/bin/rm guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=174d2be7-1a00-0000-2092-c7f0590b0000 pid=2905 execve guuid=3d2468e7-1a00-0000-2092-c7f05a0b0000 pid=2906 /usr/bin/curl net send-data write-file guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=3d2468e7-1a00-0000-2092-c7f05a0b0000 pid=2906 execve guuid=559ce7f2-1a00-0000-2092-c7f06c0b0000 pid=2924 /usr/bin/chmod guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=559ce7f2-1a00-0000-2092-c7f06c0b0000 pid=2924 execve guuid=debc3af3-1a00-0000-2092-c7f06d0b0000 pid=2925 /usr/bin/dash guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=debc3af3-1a00-0000-2092-c7f06d0b0000 pid=2925 clone guuid=0aaf4df4-1a00-0000-2092-c7f06f0b0000 pid=2927 /usr/bin/curl net send-data write-file guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=0aaf4df4-1a00-0000-2092-c7f06f0b0000 pid=2927 execve guuid=528818fc-1a00-0000-2092-c7f0780b0000 pid=2936 /usr/bin/chmod guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=528818fc-1a00-0000-2092-c7f0780b0000 pid=2936 execve guuid=3df279fc-1a00-0000-2092-c7f0790b0000 pid=2937 /usr/bin/dash guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=3df279fc-1a00-0000-2092-c7f0790b0000 pid=2937 clone guuid=9142d4fe-1a00-0000-2092-c7f07c0b0000 pid=2940 /usr/bin/curl net send-data write-file guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=9142d4fe-1a00-0000-2092-c7f07c0b0000 pid=2940 execve guuid=347fc105-1b00-0000-2092-c7f08a0b0000 pid=2954 /usr/bin/chmod guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=347fc105-1b00-0000-2092-c7f08a0b0000 pid=2954 execve guuid=a5403b06-1b00-0000-2092-c7f08b0b0000 pid=2955 /usr/bin/dash guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=a5403b06-1b00-0000-2092-c7f08b0b0000 pid=2955 clone guuid=49821607-1b00-0000-2092-c7f08d0b0000 pid=2957 /usr/bin/curl net send-data write-file guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=49821607-1b00-0000-2092-c7f08d0b0000 pid=2957 execve guuid=ff67e110-1b00-0000-2092-c7f09f0b0000 pid=2975 /usr/bin/chmod guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=ff67e110-1b00-0000-2092-c7f09f0b0000 pid=2975 execve guuid=183a1d11-1b00-0000-2092-c7f0a00b0000 pid=2976 /usr/bin/dash guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=183a1d11-1b00-0000-2092-c7f0a00b0000 pid=2976 clone guuid=da969f13-1b00-0000-2092-c7f0a70b0000 pid=2983 /usr/bin/curl net send-data write-file guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=da969f13-1b00-0000-2092-c7f0a70b0000 pid=2983 execve guuid=f3819b30-1b00-0000-2092-c7f0e20b0000 pid=3042 /usr/bin/chmod guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=f3819b30-1b00-0000-2092-c7f0e20b0000 pid=3042 execve guuid=f699dc30-1b00-0000-2092-c7f0e40b0000 pid=3044 /usr/bin/dash guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=f699dc30-1b00-0000-2092-c7f0e40b0000 pid=3044 clone guuid=0f279031-1b00-0000-2092-c7f0e70b0000 pid=3047 /usr/bin/curl net send-data write-file guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=0f279031-1b00-0000-2092-c7f0e70b0000 pid=3047 execve guuid=52fe1545-1b00-0000-2092-c7f0200c0000 pid=3104 /usr/bin/chmod guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=52fe1545-1b00-0000-2092-c7f0200c0000 pid=3104 execve guuid=d1837b45-1b00-0000-2092-c7f0220c0000 pid=3106 /usr/bin/dash guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=d1837b45-1b00-0000-2092-c7f0220c0000 pid=3106 clone guuid=879b1c46-1b00-0000-2092-c7f0250c0000 pid=3109 /usr/bin/curl net send-data write-file guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=879b1c46-1b00-0000-2092-c7f0250c0000 pid=3109 execve guuid=e25aea5a-1b00-0000-2092-c7f05d0c0000 pid=3165 /usr/bin/chmod guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=e25aea5a-1b00-0000-2092-c7f05d0c0000 pid=3165 execve guuid=44bd245b-1b00-0000-2092-c7f05e0c0000 pid=3166 /usr/bin/dash guuid=72b889e4-1a00-0000-2092-c7f04e0b0000 pid=2894->guuid=44bd245b-1b00-0000-2092-c7f05e0c0000 pid=3166 clone f1acca26-957f-5955-b81d-31f1c555ff4a 130.12.180.48:80 guuid=3d2468e7-1a00-0000-2092-c7f05a0b0000 pid=2906->f1acca26-957f-5955-b81d-31f1c555ff4a send: 80B guuid=0aaf4df4-1a00-0000-2092-c7f06f0b0000 pid=2927->f1acca26-957f-5955-b81d-31f1c555ff4a send: 81B guuid=9142d4fe-1a00-0000-2092-c7f07c0b0000 pid=2940->f1acca26-957f-5955-b81d-31f1c555ff4a send: 81B guuid=49821607-1b00-0000-2092-c7f08d0b0000 pid=2957->f1acca26-957f-5955-b81d-31f1c555ff4a send: 81B guuid=da969f13-1b00-0000-2092-c7f0a70b0000 pid=2983->f1acca26-957f-5955-b81d-31f1c555ff4a send: 81B guuid=0f279031-1b00-0000-2092-c7f0e70b0000 pid=3047->f1acca26-957f-5955-b81d-31f1c555ff4a send: 80B guuid=879b1c46-1b00-0000-2092-c7f0250c0000 pid=3109->f1acca26-957f-5955-b81d-31f1c555ff4a send: 84B
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-21 09:33:19 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (22843) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f4fd8959c0e558e9c56dbcf0cf3afdf685238aa24a4904bdf1436d8e81cffea4

(this sample)

  
Delivery method
Distributed via web download

Comments