2025-12-17 (WEDNESDAY): MIRAI ACTIVITY (LINUX TRAFFIC)

ASSOCIATED FILES:

 

2025-12-17 (WEDNESDAY): MIRAI ACTIVITY

NOTES:

- I saw in-the-wild scans/probes as recently as 2025-12-03 that used wget to run a bash script from:
  -- 158.94.210[.]88/jaws
  -- The user-agent in the HTTP headers was: Hello, world
- On 2025-12-17, I fired up a Linux VM and ran the script returned from 158.94.210[.]88/jaws
- This blog post contains the associated pcaps and malware from the activity.

ASSOCIATED FILES:

- SHA256 hash: 75eadf63fa491843ff2580532080b3e664b37a7acc44a29fdeda3922bee1b6b8
- File size: 4,816 bytes
- File type: Bourne-Again shell script text executable, ASCII text, with very long lines (349)
- File location: hxxp[:]//158.94.210[.]88/jaws
- File description: bash script to retrieve and run files for Mirai

- SHA256 hash: 5a5be8301b1b61d5ffe08de1b358574f72fad83a739b9e12ae70e93fa6ba5b14
- File size: 96,408 bytes
- File type: ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
- File location: hxxp[:]//158.94.210[.]88/596a96cc7bf9108cd896f33c44aedc8a/db0fa4b8db0333367e9bda3ab68b8042.mips
- File description: Linux executable file for Mirai

- SHA256 hash: 85e6515d887fb0ddf498df540c1a71b10438f722d85b95d613e0cbe37b7c4261
- File size: 97,224 bytes
- File type: ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
- File location: hxxp[:]//158.94.210[.]88/596a96cc7bf9108cd896f33c44aedc8a/db0fa4b8db0333367e9bda3ab68b8042.mpsl
- File description: Linux executable file for Mirai

- SHA256 hash: 74ee95ea935954d8320594f45a3ed34d956637f399d927d75f080648800106a0
- File size: 66,544 bytes
- File type: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
- File location: hxxp[:]//158.94.210[.]88/596a96cc7bf9108cd896f33c44aedc8a/db0fa4b8db0333367e9bda3ab68b8042.x86
- File description: Linux executable file for Mirai

POST INFECTION TRAFFIC:

- Various IP addresses over TCP port 23 - Attempted Telnet connections
- Various IP addresses over TCP port 37215 - Attempted TCP connections

 

Click here to return to the main page.