MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 106924453bcdd9d0106f853248632b6f53876b6c8f570c1105a9bee37e95a469. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 106924453bcdd9d0106f853248632b6f53876b6c8f570c1105a9bee37e95a469
SHA3-384 hash: 87f815a679635a6f1b31f305ed8f6093b20f9c226a32e724ce058383497b30974fe25875b55a3404a49d0255b9f6dcd5
SHA1 hash: 8ddef0fb7e40191c119b777117a884b1457db0b2
MD5 hash: 89660293808b4a6a7c509840cee459d2
humanhash: uniform-oregon-black-sweet
File name:o
Download: download sample
File size:92 bytes
First seen:2025-12-29 17:52:20 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:L6FTH6K0NUClswWnGaKzSE/LwWAAqvn:L6FTHMajDusv
TLSH T1E8B0128F00180000C004FBF419628B6010514FD136240A4C40F90530CC5463430B0D18
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://6yd.ru/mipseba1c3941f2e6e7a2099d4cceb16d574744904ec24c0b83e7aef9e34140d7e18d6 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text
First seen:
2025-12-29T16:03:00Z UTC
Last seen:
2025-12-29T16:11:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=dcd6058d-1700-0000-9604-8d17e00b0000 pid=3040 /usr/bin/sudo guuid=d8318e8f-1700-0000-9604-8d17ea0b0000 pid=3050 /tmp/sample.bin guuid=dcd6058d-1700-0000-9604-8d17e00b0000 pid=3040->guuid=d8318e8f-1700-0000-9604-8d17ea0b0000 pid=3050 execve guuid=5e79be8f-1700-0000-9604-8d17eb0b0000 pid=3051 /usr/bin/rm guuid=d8318e8f-1700-0000-9604-8d17ea0b0000 pid=3050->guuid=5e79be8f-1700-0000-9604-8d17eb0b0000 pid=3051 execve guuid=dd060190-1700-0000-9604-8d17ed0b0000 pid=3053 /usr/bin/dash guuid=d8318e8f-1700-0000-9604-8d17ea0b0000 pid=3050->guuid=dd060190-1700-0000-9604-8d17ed0b0000 pid=3053 clone guuid=c8520e90-1700-0000-9604-8d17ee0b0000 pid=3054 /usr/bin/chmod guuid=d8318e8f-1700-0000-9604-8d17ea0b0000 pid=3050->guuid=c8520e90-1700-0000-9604-8d17ee0b0000 pid=3054 execve guuid=31064e90-1700-0000-9604-8d17f00b0000 pid=3056 /usr/bin/dash guuid=d8318e8f-1700-0000-9604-8d17ea0b0000 pid=3050->guuid=31064e90-1700-0000-9604-8d17f00b0000 pid=3056 clone
Threat name:
Text.Browser.Downlaoder
Status:
Malicious
First seen:
2025-12-29 18:18:49 UTC
File Type:
Text (Shell)
AV detection:
1 of 24 (4.17%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 106924453bcdd9d0106f853248632b6f53876b6c8f570c1105a9bee37e95a469

(this sample)

  
Delivery method
Distributed via web download

Comments