MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 18d78534f696280c9ff99d50a46f3f85770f18fd389af799461e9c0dc5bff0cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 18d78534f696280c9ff99d50a46f3f85770f18fd389af799461e9c0dc5bff0cd
SHA3-384 hash: 096c33d900e820bd4fdc7bc8fb4b3e4d25b83450ac9c607961cde31853c826b3dd0940d9ae15fa95bad0b8766171e911
SHA1 hash: 3c3cc2264d3219153ebfdc23dc1cf7664a97da57
MD5 hash: 7808c592157783ee9710871655d2c473
humanhash: edward-ten-fruit-missouri
File name:l
Download: download sample
File size:709 bytes
First seen:2025-05-16 04:27:05 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:3rWKIw+u5ZMoFF7+MB05vWPOtWPNDNkpjNXWIyTtWIygDNkpjN8Tvn:yRk5zFt+MB0A1Dkpxmm0kpx8jn
TLSH T1A50128CE1158CD7158558DDE31D2191978CDC5E95ACACF87608E00BDA4CCE0CB162EB6
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.218.87.28/vv/armv4l35c14500814ac5bc2c71312bb1323f3be34afa878c7f06cefb0bf26f983564db Miraielf gafgyt mirai ua-wget
http://185.218.87.28/vv/armv7l200e571bc0a6d2562563022dfcc60ac5ac8c2e40eb73a053be8555349a674a69 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-05-16 04:29:10 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 18d78534f696280c9ff99d50a46f3f85770f18fd389af799461e9c0dc5bff0cd

(this sample)

  
Delivery method
Distributed via web download

Comments