MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2313d2be36cfe75bffced9e2221788cc4e21233ee304ecacf9da9e90a3b647c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CoinMiner
Vendor detections: 7
| SHA256 hash: | 2313d2be36cfe75bffced9e2221788cc4e21233ee304ecacf9da9e90a3b647c5 |
|---|---|
| SHA3-384 hash: | fc02fee28d0b3da58768dbab1e03d223397987d273f130c52463b3f17a6d949bf0d43678cbc2dcfcd75e04abfffd675a |
| SHA1 hash: | e688851b21133fa464d3c71417748519e6e28ca1 |
| MD5 hash: | a51a23b60b5eb15e0c1ea23fb8786e44 |
| humanhash: | bluebird-lithium-stream-robert |
| File name: | run-CN.sh |
| Download: | download sample |
| Signature | CoinMiner |
| File size: | 7'620 bytes |
| First seen: | 2025-09-08 14:56:00 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/x-shellscript |
| ssdeep | 192:F8HTKpZzzDN19xDkIam3qadayHDPMIYbMvlgYm:JzvLzaUbjU+gR |
| TLSH | T159F1D706F6D09AB42998C568844A1840754F952B5D092C08F8FDB56DFF3872CB1FDBEB |
| Magika | shell |
| Reporter | |
| Tags: | CoinMiner sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://162.248.53.119:8000/yes.tar.gz | n/a | n/a | opendir |
| http://162.248.53.119:8000/mon.sh | 1e891ab1521b27923233e694f60fdbf0e1b840e657d8b1ffdefd8b5ef5e38964 | CoinMiner | CoinMiner |
| https://github.com/el3ctr0wqw1/xmrig-vrl2/releases/download/main/xmrig-vrl | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-08T12:02:00Z UTC
Last seen:
2025-09-08T12:02:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.bc
Status:
terminated
Behavior Graph:
Score:
2%
Verdict:
Benign
File Type:
SCRIPT
Verdict:
Malicious
Threat:
Family.XMRIG
Threat name:
Script-PowerShell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-09-08 14:57:40 UTC
File Type:
Text (Shell)
AV detection:
9 of 38 (23.68%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
xmrig_linux
Score:
10/10
Tags:
family:xmrig family:xmrig_linux antivm defense_evasion discovery execution linux miner persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads CPU attributes
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Enumerates running processes
Reads hardware information
File and Directory Permissions Modification
Executes dropped EXE
XMRig Miner payload
Xmrig family
Xmrig_linux family
xmrig
Malware family:
XMRig
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.38
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
4537e474274cf7e7e1920f0ba0ccd7fc219b2698a5af85689649ceb7962953ce
Delivery method
Distributed via web download
Dropping
MD5 0782916ee8c331309e8fd467529ed93d
Dropping
SHA256 4537e474274cf7e7e1920f0ba0ccd7fc219b2698a5af85689649ceb7962953ce
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.