MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 15e18433ac32b1c07f3b99a486f6562047c0e33b33abc254ae2d5e31650a0c4a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 15e18433ac32b1c07f3b99a486f6562047c0e33b33abc254ae2d5e31650a0c4a |
|---|---|
| SHA3-384 hash: | b2121a60d364c84226550da5d21dd65f67a5b59d40fadbffea83b6fc0c91d3f0cec4e074fb8277eb7715af450537173d |
| SHA1 hash: | 891346a260a83c700805627505f2ec13e586a9f8 |
| MD5 hash: | 2d750175bee6dadd726a6d239c6a5e3a |
| humanhash: | paris-magazine-fruit-sierra |
| File name: | wert |
| Download: | download sample |
| File size: | 799 bytes |
| First seen: | 2025-02-24 09:07:34 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 12:vAdmnfTe8cn8Jvuk9rXMySwrX3AW5evrXSjWrX/R5lSNnTQKFNLQp:IdiTe8JJvDcQnt5mi8PXlSOKP8p |
| TLSH | T13E0179CD0320274188EC7CB7B1F282252686CBDCA1FF4BCBEE46263841856607561BDA |
| Magika | txt |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://193.143.1.116/nabx86 | n/a | n/a | n/a |
| http://193.143.1.116/nabmips | n/a | n/a | n/a |
| http://193.143.1.116/nabmpsl | n/a | n/a | n/a |
| http://193.143.1.116/nabarm | n/a | n/a | n/a |
| http://193.143.1.116/nabarm5 | n/a | n/a | n/a |
| http://193.143.1.116/nabarm6 | n/a | n/a | n/a |
| http://193.143.1.116/nabarm7 | n/a | n/a | n/a |
| http://193.143.1.116/nabppc | n/a | n/a | n/a |
| http://193.143.1.116/nabm68k | n/a | n/a | n/a |
| http://193.143.1.116/nabsh4 | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
24
Origin country :
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Link:
Tags:
agent virus hype
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Verdict:
Malicious
Labled as:
HTML/ExpKit.Gen2
Result
Verdict:
UNKNOWN
Score:
0%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-02-24 10:08:11 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 15e18433ac32b1c07f3b99a486f6562047c0e33b33abc254ae2d5e31650a0c4a
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.