MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 27203c1d6ef6b974db0199885189f7e82a538928c5c9d8729243c90aca4e7c4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 27203c1d6ef6b974db0199885189f7e82a538928c5c9d8729243c90aca4e7c4c
SHA3-384 hash: 3523ac13c8ed4a8854bf7e09ff8637b848974092ecc47d6fd9595fabb2e918d21dc9f62ca9212975fd5f401073aba599
SHA1 hash: fcbb3f2d4435794f63f4c7bbf4189500fe2c4848
MD5 hash: dc946cf593d473467e9ed93bc9a4ddfa
humanhash: kitten-aspen-low-oranges
File name:27203c1d6ef6b974db0199885189f7e82a538928c5c9d8729243c90aca4e7c4c.sh
Download: download sample
File size:15'325 bytes
First seen:2026-02-22 13:19:43 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 96:cCuhmB6csht+O+v1fsn+h4+tIiKqCTyOysYtujtuHKNpUj4waHv6Ml6fz7+kxBhz:cCuhK6p4hvZ5m5FG4j4HKNphvIjn
TLSH T15462473721F14A33A6D054C8A2771BA15F72D617856720B8F4BE26369F5DE0370EBB21
Magika xml
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.30.43.120/loligang.arm7n/an/aelf
http://222.186.52.155:21541/sh/AV.shn/an/abash
http://222.186.52.155:21541/sh/5053.shn/an/an/a
http://156.248.148.165:81/hiddenbin/dvr1.shn/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
26
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Status:
terminated
Behavior Graph:
%3 guuid=41055e16-1a00-0000-8e07-d7fd6b070000 pid=1899 /usr/bin/sudo guuid=ea5a1c18-1a00-0000-8e07-d7fd70070000 pid=1904 /tmp/sample.bin guuid=41055e16-1a00-0000-8e07-d7fd6b070000 pid=1899->guuid=ea5a1c18-1a00-0000-8e07-d7fd70070000 pid=1904 execve
Threat name:
Text.Browser.Generic
Status:
Suspicious
First seen:
2026-02-22 13:24:27 UTC
File Type:
Text (HTML)
AV detection:
1 of 36 (2.78%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 27203c1d6ef6b974db0199885189f7e82a538928c5c9d8729243c90aca4e7c4c

(this sample)

ce23dcad3dc7c9be8d9c8fc405a267472a3592955fa4005779a04d2642148450

  
Delivery method
Distributed via web download
  
Dropping
MD5 974ea66c02a29e0c960efc1209d6022d
  
Dropping
SHA256 ce23dcad3dc7c9be8d9c8fc405a267472a3592955fa4005779a04d2642148450

Comments