MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8b6bebd817cac1be668ddcae6f52c0eadbc8f93b221ab0bcd79673c057f4e71. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: f8b6bebd817cac1be668ddcae6f52c0eadbc8f93b221ab0bcd79673c057f4e71
SHA3-384 hash: 04575d99b3684774b787bad6d33f6d8a666f25e644ea2ef8701c38e4ecce77d89198b2c1185d20436ce53e8b2009ab4c
SHA1 hash: d6694f49562fef16412098e47284d1eed8db7170
MD5 hash: face7ac835c870f485718d2d48af77c4
humanhash: april-oscar-emma-oxygen
File name:goahead.sh
Download: download sample
Signature Mirai
File size:958 bytes
First seen:2025-09-08 15:22:08 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:7u6oRYB8XOp3dKU2hCUKAMk8QdqxH3p7JoN+/I/PN7EDoExWn8qx8O8Fo85BECqe:ToWBGhBh9Mk8QoFp7G+/I/V7Ec8atkk0
TLSH T1F511E19AE280D3741856451C72C7C22AF0AB53F906A119A8FC0D2D75FB9C898F492731
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://42.112.26.45/t/skid.armd4b3bd0bdf411126d8f45352703c51de5631a35a84a688f7c1007c439ed5a782 Mirai32-bit elf mirai Mozi
http://42.112.26.45/t/skid.arm5255fbd59b1ec6bc04c211ec2a463e8a085cadae617cc3e8c5ec6c042ea0a2daf Mirai32-bit elf mirai Mozi
http://42.112.26.45/t/skid.arm7ba590857bab1a0236965690c8f3ff4278e44cde6291259d466d1d9dc53320015 Mirai32-bit elf mirai Mozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-08T11:06:00Z UTC
Last seen:
2025-09-08T11:06:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=b69b36c3-1600-0000-fb74-a130990c0000 pid=3225 /usr/bin/sudo guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232 /tmp/sample.bin guuid=b69b36c3-1600-0000-fb74-a130990c0000 pid=3225->guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232 execve guuid=fff654cb-1600-0000-fb74-a130ac0c0000 pid=3244 /usr/bin/rm guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=fff654cb-1600-0000-fb74-a130ac0c0000 pid=3244 execve guuid=9d4407cc-1600-0000-fb74-a130ad0c0000 pid=3245 /usr/bin/busybox net send-data write-file guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=9d4407cc-1600-0000-fb74-a130ad0c0000 pid=3245 execve guuid=20d2040b-1700-0000-fb74-a130150d0000 pid=3349 /usr/bin/chmod guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=20d2040b-1700-0000-fb74-a130150d0000 pid=3349 execve guuid=0a5c4c0b-1700-0000-fb74-a130170d0000 pid=3351 /usr/bin/dash guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=0a5c4c0b-1700-0000-fb74-a130170d0000 pid=3351 clone guuid=1191f90b-1700-0000-fb74-a1301b0d0000 pid=3355 /usr/bin/rm guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=1191f90b-1700-0000-fb74-a1301b0d0000 pid=3355 execve guuid=4a10450c-1700-0000-fb74-a1301c0d0000 pid=3356 /usr/bin/busybox net send-data write-file guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=4a10450c-1700-0000-fb74-a1301c0d0000 pid=3356 execve guuid=6e85424e-1700-0000-fb74-a130b10d0000 pid=3505 /usr/bin/chmod guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=6e85424e-1700-0000-fb74-a130b10d0000 pid=3505 execve guuid=265b804e-1700-0000-fb74-a130b30d0000 pid=3507 /usr/bin/dash guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=265b804e-1700-0000-fb74-a130b30d0000 pid=3507 clone guuid=6f30f14e-1700-0000-fb74-a130b60d0000 pid=3510 /usr/bin/rm guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=6f30f14e-1700-0000-fb74-a130b60d0000 pid=3510 execve guuid=3c23234f-1700-0000-fb74-a130b70d0000 pid=3511 /usr/bin/busybox net send-data write-file guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=3c23234f-1700-0000-fb74-a130b70d0000 pid=3511 execve guuid=35395691-1700-0000-fb74-a130370e0000 pid=3639 /usr/bin/chmod guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=35395691-1700-0000-fb74-a130370e0000 pid=3639 execve guuid=7b7cca91-1700-0000-fb74-a1303a0e0000 pid=3642 /usr/bin/dash guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=7b7cca91-1700-0000-fb74-a1303a0e0000 pid=3642 clone guuid=dd4db992-1700-0000-fb74-a1303e0e0000 pid=3646 /usr/bin/busybox guuid=551c96c5-1600-0000-fb74-a130a00c0000 pid=3232->guuid=dd4db992-1700-0000-fb74-a1303e0e0000 pid=3646 execve 7e1f030a-193f-5ef8-b58f-206d09d04b13 42.112.26.45:80 guuid=9d4407cc-1600-0000-fb74-a130ad0c0000 pid=3245->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 85B guuid=4a10450c-1700-0000-fb74-a1301c0d0000 pid=3356->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 86B guuid=3c23234f-1700-0000-fb74-a130b70d0000 pid=3511->7e1f030a-193f-5ef8-b58f-206d09d04b13 send: 86B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-09-08 11:58:29 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (29930) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh f8b6bebd817cac1be668ddcae6f52c0eadbc8f93b221ab0bcd79673c057f4e71

(this sample)

  
Delivery method
Distributed via web download

Comments