MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc5513de4fffab460438094ffd4d1efc6f367e12f88d3fd9345c69c667da2cf9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: fc5513de4fffab460438094ffd4d1efc6f367e12f88d3fd9345c69c667da2cf9
SHA3-384 hash: b2d5c884a3f2f102b2bff3434741185fb99b9b149daae06cf07fb408a77455eead999f519bb2969f7c6ed3d5ed2b3d87
SHA1 hash: e72ee5a0e78e6b70064c176f0d6dff722e12990e
MD5 hash: b93011271311cac94803784cac788eee
humanhash: echo-cola-oranges-pip
File name:weed.sh
Download: download sample
Signature Mirai
File size:925 bytes
First seen:2025-06-23 10:53:47 UTC
Last seen:2025-06-24 07:16:07 UTC
File type: sh
MIME type:text/plain
ssdeep 24:W7mV/a5zqwt+MB09ZpZmk8M1ik8M1Z1Wk8MU7k8e:WL5XEA0qkQkNZkkekH
TLSH T121112BCF6156CCA0DC9119DD3A534924F48DD9D525CF8E8DB2CD4535F48DD083621F69
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/armv5l506a3e39a46d0e6d13ba89dd5a6fe2aa81c5122db15742d4ce509a3c0738ff01 Miraielf gafgyt mirai ua-wget
http://158.51.126.131/armv7l69c12ce6f569adfaa217f1ebd365b727e3d2f882f22ef10169c8dc7ad3a05f4e Miraielf gafgyt mirai ua-wget
http://158.51.126.131/mipsn/an/aelf gafgyt mirai ua-wget
http://158.51.126.131/mipsel68b7a90ca3d6b4034d4428ee1483178d9a69171090087523ecd8d2314aa60603 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
68
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
trojan agent virus
Status:
terminated
Behavior Graph:
%3 guuid=8b5184d8-1900-0000-2dd7-744fba070000 pid=1978 /usr/bin/sudo guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984 /tmp/sample.bin guuid=8b5184d8-1900-0000-2dd7-744fba070000 pid=1978->guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984 execve guuid=42ebe7da-1900-0000-2dd7-744fc2070000 pid=1986 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=42ebe7da-1900-0000-2dd7-744fc2070000 pid=1986 clone guuid=d65c05dc-1900-0000-2dd7-744fcb070000 pid=1995 /usr/bin/rm delete-file guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=d65c05dc-1900-0000-2dd7-744fcb070000 pid=1995 execve guuid=61ab44dc-1900-0000-2dd7-744fcc070000 pid=1996 /usr/bin/rm delete-file guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=61ab44dc-1900-0000-2dd7-744fcc070000 pid=1996 execve guuid=22b79bdc-1900-0000-2dd7-744fcd070000 pid=1997 /usr/bin/rm delete-file guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=22b79bdc-1900-0000-2dd7-744fcd070000 pid=1997 execve guuid=59c2f2dc-1900-0000-2dd7-744fce070000 pid=1998 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=59c2f2dc-1900-0000-2dd7-744fce070000 pid=1998 clone guuid=54a12bde-1900-0000-2dd7-744fd0070000 pid=2000 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=54a12bde-1900-0000-2dd7-744fd0070000 pid=2000 clone guuid=1c16a1de-1900-0000-2dd7-744fd2070000 pid=2002 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=1c16a1de-1900-0000-2dd7-744fd2070000 pid=2002 clone guuid=85a7c408-1a00-0000-2dd7-744f14080000 pid=2068 /usr/bin/chmod guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=85a7c408-1a00-0000-2dd7-744f14080000 pid=2068 execve guuid=540d3e09-1a00-0000-2dd7-744f15080000 pid=2069 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=540d3e09-1a00-0000-2dd7-744f15080000 pid=2069 clone guuid=777abb0b-1a00-0000-2dd7-744f1b080000 pid=2075 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=777abb0b-1a00-0000-2dd7-744f1b080000 pid=2075 clone guuid=4a0a0336-1a00-0000-2dd7-744f7d080000 pid=2173 /usr/bin/chmod guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=4a0a0336-1a00-0000-2dd7-744f7d080000 pid=2173 execve guuid=2a8d6536-1a00-0000-2dd7-744f80080000 pid=2176 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=2a8d6536-1a00-0000-2dd7-744f80080000 pid=2176 clone guuid=8dcd2a37-1a00-0000-2dd7-744f83080000 pid=2179 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=8dcd2a37-1a00-0000-2dd7-744f83080000 pid=2179 clone guuid=f5925c62-1a00-0000-2dd7-744f00090000 pid=2304 /usr/bin/chmod guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=f5925c62-1a00-0000-2dd7-744f00090000 pid=2304 execve guuid=2303ad62-1a00-0000-2dd7-744f01090000 pid=2305 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=2303ad62-1a00-0000-2dd7-744f01090000 pid=2305 clone guuid=9f4f5164-1a00-0000-2dd7-744f07090000 pid=2311 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=9f4f5164-1a00-0000-2dd7-744f07090000 pid=2311 clone guuid=8e72678e-1a00-0000-2dd7-744f49090000 pid=2377 /usr/bin/chmod guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=8e72678e-1a00-0000-2dd7-744f49090000 pid=2377 execve guuid=53397f8f-1a00-0000-2dd7-744f4a090000 pid=2378 /usr/bin/dash guuid=6a8c64da-1900-0000-2dd7-744fc0070000 pid=1984->guuid=53397f8f-1a00-0000-2dd7-744f4a090000 pid=2378 clone guuid=fdb2f3da-1900-0000-2dd7-744fc3070000 pid=1987 /usr/bin/cat guuid=42ebe7da-1900-0000-2dd7-744fc2070000 pid=1986->guuid=fdb2f3da-1900-0000-2dd7-744fc3070000 pid=1987 execve guuid=aa8efcda-1900-0000-2dd7-744fc4070000 pid=1988 /usr/bin/grep guuid=42ebe7da-1900-0000-2dd7-744fc2070000 pid=1986->guuid=aa8efcda-1900-0000-2dd7-744fc4070000 pid=1988 execve guuid=7dd500db-1900-0000-2dd7-744fc5070000 pid=1989 /usr/bin/grep guuid=42ebe7da-1900-0000-2dd7-744fc2070000 pid=1986->guuid=7dd500db-1900-0000-2dd7-744fc5070000 pid=1989 execve guuid=913d05db-1900-0000-2dd7-744fc6070000 pid=1990 /usr/bin/grep guuid=42ebe7da-1900-0000-2dd7-744fc2070000 pid=1986->guuid=913d05db-1900-0000-2dd7-744fc6070000 pid=1990 execve guuid=ae140bdb-1900-0000-2dd7-744fc7070000 pid=1991 /usr/bin/cut guuid=42ebe7da-1900-0000-2dd7-744fc2070000 pid=1986->guuid=ae140bdb-1900-0000-2dd7-744fc7070000 pid=1991 execve guuid=e48afadc-1900-0000-2dd7-744fcf070000 pid=1999 /usr/bin/cp write-file guuid=59c2f2dc-1900-0000-2dd7-744fce070000 pid=1998->guuid=e48afadc-1900-0000-2dd7-744fcf070000 pid=1999 execve guuid=be3e36de-1900-0000-2dd7-744fd1070000 pid=2001 /usr/bin/chmod guuid=54a12bde-1900-0000-2dd7-744fd0070000 pid=2000->guuid=be3e36de-1900-0000-2dd7-744fd1070000 pid=2001 execve guuid=f726abde-1900-0000-2dd7-744fd3070000 pid=2003 /usr/bin/wget net send-data write-file guuid=1c16a1de-1900-0000-2dd7-744fd2070000 pid=2002->guuid=f726abde-1900-0000-2dd7-744fd3070000 pid=2003 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=f726abde-1900-0000-2dd7-744fd3070000 pid=2003->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=8575c70b-1a00-0000-2dd7-744f1c080000 pid=2076 /usr/bin/wget net send-data write-file guuid=777abb0b-1a00-0000-2dd7-744f1b080000 pid=2075->guuid=8575c70b-1a00-0000-2dd7-744f1c080000 pid=2076 execve guuid=8575c70b-1a00-0000-2dd7-744f1c080000 pid=2076->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=afbd3337-1a00-0000-2dd7-744f84080000 pid=2180 /usr/bin/wget net send-data write-file guuid=8dcd2a37-1a00-0000-2dd7-744f83080000 pid=2179->guuid=afbd3337-1a00-0000-2dd7-744f84080000 pid=2180 execve guuid=afbd3337-1a00-0000-2dd7-744f84080000 pid=2180->2beca644-24da-5e18-bc49-c06b8c4a111d send: 133B guuid=ee095764-1a00-0000-2dd7-744f08090000 pid=2312 /usr/bin/wget net send-data write-file guuid=9f4f5164-1a00-0000-2dd7-744f07090000 pid=2311->guuid=ee095764-1a00-0000-2dd7-744f08090000 pid=2312 execve guuid=ee095764-1a00-0000-2dd7-744f08090000 pid=2312->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-06-23 10:54:42 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh fc5513de4fffab460438094ffd4d1efc6f367e12f88d3fd9345c69c667da2cf9

(this sample)

  
Delivery method
Distributed via web download

Comments