MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 199ec44a16c6b4ff55cd8cc13eb7a5450be69c8d71ef62215bcfffc824609242. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 199ec44a16c6b4ff55cd8cc13eb7a5450be69c8d71ef62215bcfffc824609242
SHA3-384 hash: a0e3fd06f852ed27917537ac3495597713831089c6f45c02341bde918481cae8cf674b6cbdcb9ab565120744494b7eed
SHA1 hash: c335c5521af7f8d7a2d78b484d2e0cf129342493
MD5 hash: 93a1b3a4c84ef5c2441215109ccf3d51
humanhash: montana-romeo-carolina-earth
File name:asus.sh
Download: download sample
File size:1'079 bytes
First seen:2025-07-14 06:17:54 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:sEUSIbK5zOt+MB0heZ1hkrjUkrspsmkrGhkrErk1:sEUXK5CEA0sZnkUkOkmkik1
TLSH T15A118BCF1A62D860CC646DD936920814F08DD6E431CB8E8CA2CD5031D4DDE08B592F5C
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/v/mipsd4e2e83716082a12346f565d13cc06546a099a05725f194c135f7b3839473a6c Miraielf mirai ua-wget
http://158.51.126.131/v/mipsel8db391280f5fda83a9dc476d69d093827bb72b3a90c3112679855eacabb996e1 Miraielf mirai ua-wget
http://158.51.126.131/v/armv5l79d810e67c7bd6c6669214c1c4b631829d90726886b4167a232813d8434ef3f7 Miraielf mirai ua-wget
http://158.51.126.131/v/armv7lc3788d92bfc3a08dbcca4476832c46b099bcad182c56cdbccf837eb0edb6cd77 Miraielf mirai ua-wget
http://158.51.126.131/v/mips645b8d146becb958e05c15dced8d8ae5a853b0a3105029c1d30255cda4c793e642 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
26
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=29ee1187-1600-0000-cc9d-2423810c0000 pid=3201 /usr/bin/sudo guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202 /tmp/sample.bin guuid=29ee1187-1600-0000-cc9d-2423810c0000 pid=3201->guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202 execve guuid=e4c9018b-1600-0000-cc9d-2423830c0000 pid=3203 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=e4c9018b-1600-0000-cc9d-2423830c0000 pid=3203 clone guuid=df2ecd8c-1600-0000-cc9d-2423890c0000 pid=3209 /usr/bin/rm delete-file guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=df2ecd8c-1600-0000-cc9d-2423890c0000 pid=3209 execve guuid=8df7268d-1600-0000-cc9d-24238a0c0000 pid=3210 /usr/bin/rm delete-file guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=8df7268d-1600-0000-cc9d-24238a0c0000 pid=3210 execve guuid=2cf07a8d-1600-0000-cc9d-24238b0c0000 pid=3211 /usr/bin/rm delete-file guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=2cf07a8d-1600-0000-cc9d-24238b0c0000 pid=3211 execve guuid=ebd9cf8d-1600-0000-cc9d-24238c0c0000 pid=3212 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=ebd9cf8d-1600-0000-cc9d-24238c0c0000 pid=3212 clone guuid=6ed7e48e-1600-0000-cc9d-24238e0c0000 pid=3214 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=6ed7e48e-1600-0000-cc9d-24238e0c0000 pid=3214 clone guuid=d64b528f-1600-0000-cc9d-2423900c0000 pid=3216 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=d64b528f-1600-0000-cc9d-2423900c0000 pid=3216 clone guuid=47ad7cba-1600-0000-cc9d-2423bc0c0000 pid=3260 /usr/bin/chmod guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=47ad7cba-1600-0000-cc9d-2423bc0c0000 pid=3260 execve guuid=37251cbb-1600-0000-cc9d-2423bd0c0000 pid=3261 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=37251cbb-1600-0000-cc9d-2423bd0c0000 pid=3261 clone guuid=16f33ebc-1600-0000-cc9d-2423bf0c0000 pid=3263 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=16f33ebc-1600-0000-cc9d-2423bf0c0000 pid=3263 clone guuid=59984fe7-1600-0000-cc9d-2423020d0000 pid=3330 /usr/bin/chmod guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=59984fe7-1600-0000-cc9d-2423020d0000 pid=3330 execve guuid=2fe4f8e7-1600-0000-cc9d-2423030d0000 pid=3331 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=2fe4f8e7-1600-0000-cc9d-2423030d0000 pid=3331 clone guuid=89d203e9-1600-0000-cc9d-2423060d0000 pid=3334 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=89d203e9-1600-0000-cc9d-2423060d0000 pid=3334 clone guuid=fa717c14-1700-0000-cc9d-24233a0d0000 pid=3386 /usr/bin/chmod guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=fa717c14-1700-0000-cc9d-24233a0d0000 pid=3386 execve guuid=046f1415-1700-0000-cc9d-24233b0d0000 pid=3387 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=046f1415-1700-0000-cc9d-24233b0d0000 pid=3387 clone guuid=e0fb4f16-1700-0000-cc9d-24233d0d0000 pid=3389 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=e0fb4f16-1700-0000-cc9d-24233d0d0000 pid=3389 clone guuid=87472741-1700-0000-cc9d-2423960d0000 pid=3478 /usr/bin/chmod guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=87472741-1700-0000-cc9d-2423960d0000 pid=3478 execve guuid=06a4a441-1700-0000-cc9d-2423980d0000 pid=3480 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=06a4a441-1700-0000-cc9d-2423980d0000 pid=3480 clone guuid=4bf39742-1700-0000-cc9d-24239b0d0000 pid=3483 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=4bf39742-1700-0000-cc9d-24239b0d0000 pid=3483 clone guuid=e3b0296d-1700-0000-cc9d-2423f30d0000 pid=3571 /usr/bin/chmod guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=e3b0296d-1700-0000-cc9d-2423f30d0000 pid=3571 execve guuid=8c40906d-1700-0000-cc9d-2423f50d0000 pid=3573 /usr/bin/dash guuid=29e3998a-1600-0000-cc9d-2423820c0000 pid=3202->guuid=8c40906d-1700-0000-cc9d-2423f50d0000 pid=3573 clone guuid=f3bc098b-1600-0000-cc9d-2423840c0000 pid=3204 /usr/bin/cat guuid=e4c9018b-1600-0000-cc9d-2423830c0000 pid=3203->guuid=f3bc098b-1600-0000-cc9d-2423840c0000 pid=3204 execve guuid=63f90f8b-1600-0000-cc9d-2423850c0000 pid=3205 /usr/bin/grep guuid=e4c9018b-1600-0000-cc9d-2423830c0000 pid=3203->guuid=63f90f8b-1600-0000-cc9d-2423850c0000 pid=3205 execve guuid=8433178b-1600-0000-cc9d-2423860c0000 pid=3206 /usr/bin/grep guuid=e4c9018b-1600-0000-cc9d-2423830c0000 pid=3203->guuid=8433178b-1600-0000-cc9d-2423860c0000 pid=3206 execve guuid=d6291c8b-1600-0000-cc9d-2423870c0000 pid=3207 /usr/bin/grep guuid=e4c9018b-1600-0000-cc9d-2423830c0000 pid=3203->guuid=d6291c8b-1600-0000-cc9d-2423870c0000 pid=3207 execve guuid=309f218b-1600-0000-cc9d-2423880c0000 pid=3208 /usr/bin/cut guuid=e4c9018b-1600-0000-cc9d-2423830c0000 pid=3203->guuid=309f218b-1600-0000-cc9d-2423880c0000 pid=3208 execve guuid=d6aed88d-1600-0000-cc9d-24238d0c0000 pid=3213 /usr/bin/cp write-file guuid=ebd9cf8d-1600-0000-cc9d-24238c0c0000 pid=3212->guuid=d6aed88d-1600-0000-cc9d-24238d0c0000 pid=3213 execve guuid=b659ee8e-1600-0000-cc9d-24238f0c0000 pid=3215 /usr/bin/chmod guuid=6ed7e48e-1600-0000-cc9d-24238e0c0000 pid=3214->guuid=b659ee8e-1600-0000-cc9d-24238f0c0000 pid=3215 execve guuid=df91608f-1600-0000-cc9d-2423910c0000 pid=3217 /usr/bin/wget net send-data write-file guuid=d64b528f-1600-0000-cc9d-2423900c0000 pid=3216->guuid=df91608f-1600-0000-cc9d-2423910c0000 pid=3217 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=df91608f-1600-0000-cc9d-2423910c0000 pid=3217->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=78f74fbc-1600-0000-cc9d-2423c00c0000 pid=3264 /usr/bin/wget net send-data write-file guuid=16f33ebc-1600-0000-cc9d-2423bf0c0000 pid=3263->guuid=78f74fbc-1600-0000-cc9d-2423c00c0000 pid=3264 execve guuid=78f74fbc-1600-0000-cc9d-2423c00c0000 pid=3264->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=c72415e9-1600-0000-cc9d-2423070d0000 pid=3335 /usr/bin/wget net send-data write-file guuid=89d203e9-1600-0000-cc9d-2423060d0000 pid=3334->guuid=c72415e9-1600-0000-cc9d-2423070d0000 pid=3335 execve guuid=c72415e9-1600-0000-cc9d-2423070d0000 pid=3335->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=0b165b16-1700-0000-cc9d-24233e0d0000 pid=3390 /usr/bin/wget net send-data write-file guuid=e0fb4f16-1700-0000-cc9d-24233d0d0000 pid=3389->guuid=0b165b16-1700-0000-cc9d-24233e0d0000 pid=3390 execve guuid=0b165b16-1700-0000-cc9d-24233e0d0000 pid=3390->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=726ba142-1700-0000-cc9d-24239c0d0000 pid=3484 /usr/bin/wget net send-data write-file guuid=4bf39742-1700-0000-cc9d-24239b0d0000 pid=3483->guuid=726ba142-1700-0000-cc9d-24239c0d0000 pid=3484 execve guuid=726ba142-1700-0000-cc9d-24239c0d0000 pid=3484->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-07-14 06:18:18 UTC
File Type:
Text (Shell)
AV detection:
9 of 24 (37.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 199ec44a16c6b4ff55cd8cc13eb7a5450be69c8d71ef62215bcfffc824609242

(this sample)

  
Delivery method
Distributed via web download

Comments