MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 106924453bcdd9d0106f853248632b6f53876b6c8f570c1105a9bee37e95a469. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 106924453bcdd9d0106f853248632b6f53876b6c8f570c1105a9bee37e95a469 |
|---|---|
| SHA3-384 hash: | 87f815a679635a6f1b31f305ed8f6093b20f9c226a32e724ce058383497b30974fe25875b55a3404a49d0255b9f6dcd5 |
| SHA1 hash: | 8ddef0fb7e40191c119b777117a884b1457db0b2 |
| MD5 hash: | 89660293808b4a6a7c509840cee459d2 |
| humanhash: | uniform-oregon-black-sweet |
| File name: | o |
| Download: | download sample |
| File size: | 92 bytes |
| First seen: | 2025-12-29 17:52:20 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 3:L6FTH6K0NUClswWnGaKzSE/LwWAAqvn:L6FTHMajDusv |
| TLSH | T1E8B0128F00180000C004FBF419628B6010514FD136240A4C40F90530CC5463430B0D18 |
| Magika | txt |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://6yd.ru/mipseb | a1c3941f2e6e7a2099d4cceb16d574744904ec24c0b83e7aef9e34140d7e18d6 | Mirai | elf mirai ua-wget |
Intelligence
File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DEVendor Threat Intelligence
No detections
Detection(s):
Verdict:
Suspicious
Labled as:
TrojanDownloader/Linux.Agent
Verdict:
Malicious
File Type:
text
First seen:
2025-12-29T16:03:00Z UTC
Last seen:
2025-12-29T16:11:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
Score:
98%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Text.Browser.Downlaoder
Status:
Malicious
First seen:
2025-12-29 18:18:49 UTC
File Type:
Text (Shell)
AV detection:
1 of 24 (4.17%)
Threat level:
4/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 106924453bcdd9d0106f853248632b6f53876b6c8f570c1105a9bee37e95a469
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.