MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12ebfcfb15744cce3895d0388388ee3160757c26fc6fa607b4b1cb46e2017872. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 12ebfcfb15744cce3895d0388388ee3160757c26fc6fa607b4b1cb46e2017872
SHA3-384 hash: 7d6dfce271e39c007d40a6443d9e72aa348f88b51e79089c7651cd4dee608bb327813b3afefaa7b4285ba7390d9e5d34
SHA1 hash: 4bfcbf09bbb37c199ae1fd46cd0618c1d5fbfe98
MD5 hash: ef182860bb90bb936d7a8c7a10f658fa
humanhash: butter-monkey-louisiana-idaho
File name:bins.sh
Download: download sample
File size:581 bytes
First seen:2025-10-17 16:04:47 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:tzwcfzePLrftWK8tX5lf6NIxVEKAfH+VKE2DkCzp8wpO:t1zez7stbF6NIxqKCeVKEoz6wE
TLSH T1CEF0ECAB3D70361A4484ED56B1337544A035D6C639D347C7FE9CF17B429CA42F065E86
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://23.177.185.39/nshkarmee73755d0d2cfc53b201b49e6b90532682d1a94a8b732728d6b39d989e1608a6 Miraielf mirai ua-wget
http://23.177.185.39/nshkarm573ef0e9dccc2d8a5b17d1c0aab975e59099adf6882d1f6e48c9f8361fd286c17 Miraielf mirai ua-wget
http://23.177.185.39/nshkarm6c6914f62bb9235122a7439258b16d4f5009ed8f3a309f0ceee4170319c77c5bd Miraielf mirai ua-wget
http://23.177.185.39/nshkarm7bf31ccf6b8097d847357bbb335a425f0424d3186b15879542631fc73c9bad8bc Miraielf mirai ua-wget
http://23.177.185.39/nshkmips98a4fd83ed3a0dbbea35953ea071e6535adf978f5892a7508d148151658e2352 Miraielf mirai ua-wget
http://23.177.185.39/nshkmpsld2436aee766bdc58cdf18eae0c1aa184f28fe8e19a1313036e2a6f0526eac433 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
49
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-10-17T14:17:00Z UTC
Last seen:
2025-10-18T00:44:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=965998eb-1600-0000-7f41-fb33b20c0000 pid=3250 /usr/bin/sudo guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252 /tmp/sample.bin guuid=965998eb-1600-0000-7f41-fb33b20c0000 pid=3250->guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252 execve guuid=c473c4ef-1600-0000-7f41-fb33b50c0000 pid=3253 /usr/bin/mkdir guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=c473c4ef-1600-0000-7f41-fb33b50c0000 pid=3253 execve guuid=a0f36af0-1600-0000-7f41-fb33b60c0000 pid=3254 /usr/bin/wget net send-data write-file guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=a0f36af0-1600-0000-7f41-fb33b60c0000 pid=3254 execve guuid=2ad5b11f-1700-0000-7f41-fb330c0d0000 pid=3340 /usr/bin/chmod guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=2ad5b11f-1700-0000-7f41-fb330c0d0000 pid=3340 execve guuid=b1dd6d20-1700-0000-7f41-fb330e0d0000 pid=3342 /usr/bin/dash guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=b1dd6d20-1700-0000-7f41-fb330e0d0000 pid=3342 clone guuid=a45dc021-1700-0000-7f41-fb33120d0000 pid=3346 /usr/bin/rm guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=a45dc021-1700-0000-7f41-fb33120d0000 pid=3346 execve guuid=64782b22-1700-0000-7f41-fb33140d0000 pid=3348 /usr/bin/wget net send-data write-file guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=64782b22-1700-0000-7f41-fb33140d0000 pid=3348 execve guuid=6a5bb551-1700-0000-7f41-fb33720d0000 pid=3442 /usr/bin/chmod guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=6a5bb551-1700-0000-7f41-fb33720d0000 pid=3442 execve guuid=f3713452-1700-0000-7f41-fb33740d0000 pid=3444 /usr/bin/dash guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=f3713452-1700-0000-7f41-fb33740d0000 pid=3444 clone guuid=ecb32353-1700-0000-7f41-fb33780d0000 pid=3448 /usr/bin/rm guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=ecb32353-1700-0000-7f41-fb33780d0000 pid=3448 execve guuid=98799353-1700-0000-7f41-fb33790d0000 pid=3449 /usr/bin/wget net send-data write-file guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=98799353-1700-0000-7f41-fb33790d0000 pid=3449 execve guuid=1cc04a7f-1700-0000-7f41-fb33c70d0000 pid=3527 /usr/bin/chmod guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=1cc04a7f-1700-0000-7f41-fb33c70d0000 pid=3527 execve guuid=f960bd7f-1700-0000-7f41-fb33c90d0000 pid=3529 /usr/bin/dash guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=f960bd7f-1700-0000-7f41-fb33c90d0000 pid=3529 clone guuid=d559c280-1700-0000-7f41-fb33cc0d0000 pid=3532 /usr/bin/rm guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=d559c280-1700-0000-7f41-fb33cc0d0000 pid=3532 execve guuid=1abd2a81-1700-0000-7f41-fb33cd0d0000 pid=3533 /usr/bin/wget net send-data write-file guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=1abd2a81-1700-0000-7f41-fb33cd0d0000 pid=3533 execve guuid=9e6491a6-1700-0000-7f41-fb33130e0000 pid=3603 /usr/bin/chmod guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=9e6491a6-1700-0000-7f41-fb33130e0000 pid=3603 execve guuid=5a97e4a6-1700-0000-7f41-fb33150e0000 pid=3605 /usr/bin/dash guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=5a97e4a6-1700-0000-7f41-fb33150e0000 pid=3605 clone guuid=a9e995a7-1700-0000-7f41-fb33190e0000 pid=3609 /usr/bin/rm guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=a9e995a7-1700-0000-7f41-fb33190e0000 pid=3609 execve guuid=8335d1a7-1700-0000-7f41-fb331b0e0000 pid=3611 /usr/bin/wget net send-data write-file guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=8335d1a7-1700-0000-7f41-fb331b0e0000 pid=3611 execve guuid=0a92fde5-1700-0000-7f41-fb33b30e0000 pid=3763 /usr/bin/chmod guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=0a92fde5-1700-0000-7f41-fb33b30e0000 pid=3763 execve guuid=9ed15de6-1700-0000-7f41-fb33b50e0000 pid=3765 /usr/bin/dash guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=9ed15de6-1700-0000-7f41-fb33b50e0000 pid=3765 clone guuid=0a0419e8-1700-0000-7f41-fb33ba0e0000 pid=3770 /usr/bin/rm guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=0a0419e8-1700-0000-7f41-fb33ba0e0000 pid=3770 execve guuid=2cc693e8-1700-0000-7f41-fb33bc0e0000 pid=3772 /usr/bin/wget net send-data write-file guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=2cc693e8-1700-0000-7f41-fb33bc0e0000 pid=3772 execve guuid=0e2a3c15-1800-0000-7f41-fb332e0f0000 pid=3886 /usr/bin/chmod guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=0e2a3c15-1800-0000-7f41-fb332e0f0000 pid=3886 execve guuid=efc4df15-1800-0000-7f41-fb33320f0000 pid=3890 /usr/bin/dash guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=efc4df15-1800-0000-7f41-fb33320f0000 pid=3890 clone guuid=4aa0f815-1800-0000-7f41-fb33330f0000 pid=3891 /usr/bin/rm delete-file guuid=33e347ef-1600-0000-7f41-fb33b40c0000 pid=3252->guuid=4aa0f815-1800-0000-7f41-fb33330f0000 pid=3891 execve ba55188c-1d8c-531d-84cb-0b022f7a1844 23.177.185.39:80 guuid=a0f36af0-1600-0000-7f41-fb33b60c0000 pid=3254->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 135B guuid=64782b22-1700-0000-7f41-fb33140d0000 pid=3348->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 136B guuid=98799353-1700-0000-7f41-fb33790d0000 pid=3449->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 136B guuid=1abd2a81-1700-0000-7f41-fb33cd0d0000 pid=3533->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 136B guuid=8335d1a7-1700-0000-7f41-fb331b0e0000 pid=3611->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 136B guuid=2cc693e8-1700-0000-7f41-fb33bc0e0000 pid=3772->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 136B
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-17 16:06:01 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 12ebfcfb15744cce3895d0388388ee3160757c26fc6fa607b4b1cb46e2017872

(this sample)

  
Delivery method
Distributed via web download

Comments