MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 321a7f927f1b800c3776892d20c5fde739c68ce35fde3d71aeac1a6704a4dc03. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 321a7f927f1b800c3776892d20c5fde739c68ce35fde3d71aeac1a6704a4dc03
SHA3-384 hash: 71c4940d978c675b43db63f59337fced9066aa9e02d288712d54fa3254fa80911e2cf8575e31057da0c8b0bfff834d39
SHA1 hash: d241a60db4d42c24d39fd0b16ca9d8efecaea5cd
MD5 hash: 3e4e3e44e42dd44dd42033043618744d
humanhash: crazy-bravo-high-ack
File name:tplink.sh
Download: download sample
File size:558 bytes
First seen:2026-03-27 15:17:27 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:aUOW8oMHf8MwQLGWcM+O4+ONn7MXwlNUI:YGIGWkqecUP
TLSH T102F01DCA2666D77AA699CE48B0B3483AF01FDAC031E50E4EDD8B1DBE0F41810B114F68
Magika txt
Reporter BlinkzSec
URLMalware sample (SHA256 hash)SignatureTags
http://147.45.60.206/mipskn/an/an/a
http://147.45.60.206/mpslkn/an/an/a
http://147.45.60.206/arm4kn/an/an/a
http://147.45.60.206/arm5kn/an/an/a
http://147.45.60.206/arm7kn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
GB GB
Vendor Threat Intelligence
No detections
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=072559d3-1700-0000-4e42-a796b00b0000 pid=2992 /usr/bin/sudo guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997 /tmp/sample.bin guuid=072559d3-1700-0000-4e42-a796b00b0000 pid=2992->guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997 execve guuid=045afcd5-1700-0000-4e42-a796b60b0000 pid=2998 /usr/bin/rm delete-file guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=045afcd5-1700-0000-4e42-a796b60b0000 pid=2998 execve guuid=793ba5d6-1700-0000-4e42-a796b80b0000 pid=3000 /usr/bin/wget net send-data write-file guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=793ba5d6-1700-0000-4e42-a796b80b0000 pid=3000 execve guuid=c90cc9f1-1700-0000-4e42-a796040c0000 pid=3076 /usr/bin/chmod guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=c90cc9f1-1700-0000-4e42-a796040c0000 pid=3076 execve guuid=0cd10df2-1700-0000-4e42-a796060c0000 pid=3078 /usr/bin/dash guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=0cd10df2-1700-0000-4e42-a796060c0000 pid=3078 clone guuid=fe938af2-1700-0000-4e42-a7960a0c0000 pid=3082 /usr/bin/wget net send-data write-file guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=fe938af2-1700-0000-4e42-a7960a0c0000 pid=3082 execve guuid=ce0aab0b-1800-0000-4e42-a796560c0000 pid=3158 /usr/bin/chmod guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=ce0aab0b-1800-0000-4e42-a796560c0000 pid=3158 execve guuid=2924090c-1800-0000-4e42-a796570c0000 pid=3159 /usr/bin/dash guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=2924090c-1800-0000-4e42-a796570c0000 pid=3159 clone guuid=afadc80c-1800-0000-4e42-a7965b0c0000 pid=3163 /usr/bin/wget net send-data write-file guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=afadc80c-1800-0000-4e42-a7965b0c0000 pid=3163 execve guuid=f60c8f26-1800-0000-4e42-a796720c0000 pid=3186 /usr/bin/chmod guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=f60c8f26-1800-0000-4e42-a796720c0000 pid=3186 execve guuid=a3b22d27-1800-0000-4e42-a796730c0000 pid=3187 /usr/bin/dash guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=a3b22d27-1800-0000-4e42-a796730c0000 pid=3187 clone guuid=67f35928-1800-0000-4e42-a796750c0000 pid=3189 /usr/bin/wget net send-data write-file guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=67f35928-1800-0000-4e42-a796750c0000 pid=3189 execve guuid=24669942-1800-0000-4e42-a7969a0c0000 pid=3226 /usr/bin/chmod guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=24669942-1800-0000-4e42-a7969a0c0000 pid=3226 execve guuid=b03bf642-1800-0000-4e42-a7969b0c0000 pid=3227 /usr/bin/dash guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=b03bf642-1800-0000-4e42-a7969b0c0000 pid=3227 clone guuid=e6bcc943-1800-0000-4e42-a7969d0c0000 pid=3229 /usr/bin/wget net send-data write-file guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=e6bcc943-1800-0000-4e42-a7969d0c0000 pid=3229 execve guuid=3a16605d-1800-0000-4e42-a796b30c0000 pid=3251 /usr/bin/chmod guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=3a16605d-1800-0000-4e42-a796b30c0000 pid=3251 execve guuid=7635b85d-1800-0000-4e42-a796b40c0000 pid=3252 /usr/bin/dash guuid=483bbcd5-1700-0000-4e42-a796b50b0000 pid=2997->guuid=7635b85d-1800-0000-4e42-a796b40c0000 pid=3252 clone 74581207-1437-540f-921e-06f7eaf2023d 147.45.60.206:80 guuid=793ba5d6-1700-0000-4e42-a796b80b0000 pid=3000->74581207-1437-540f-921e-06f7eaf2023d send: 133B guuid=fe938af2-1700-0000-4e42-a7960a0c0000 pid=3082->74581207-1437-540f-921e-06f7eaf2023d send: 133B guuid=afadc80c-1800-0000-4e42-a7965b0c0000 pid=3163->74581207-1437-540f-921e-06f7eaf2023d send: 133B guuid=67f35928-1800-0000-4e42-a796750c0000 pid=3189->74581207-1437-540f-921e-06f7eaf2023d send: 133B guuid=e6bcc943-1800-0000-4e42-a7969d0c0000 pid=3229->74581207-1437-540f-921e-06f7eaf2023d send: 133B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2026-03-27 15:16:50 UTC
File Type:
Text (Shell)
AV detection:
6 of 36 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 321a7f927f1b800c3776892d20c5fde739c68ce35fde3d71aeac1a6704a4dc03

(this sample)

  
Delivery method
Distributed via web download

Comments