MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 344e735f08f4a4d9072fb62d958855d7042c28cba0db0c3382f7231bf30340a7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 344e735f08f4a4d9072fb62d958855d7042c28cba0db0c3382f7231bf30340a7
SHA3-384 hash: d84cabd0aad25938aa281685ed1059f19304f40590b24019d2c4c7062ba25388d67c69af9290b82d9d09e9cc06d932e2
SHA1 hash: e7717b8077b6d2752d7a478fa4c27e769727d51d
MD5 hash: 46d7905ba3ffd99c251ae9db4aa9e9d7
humanhash: sweet-connecticut-mobile-harry
File name:x
Download: download sample
File size:95 bytes
First seen:2025-02-24 09:02:37 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:GRFXWgr1pOvaGN3zSTASUKoS6wWX+v1FA:SXWgr1cSaqA5HwQGA
TLSH T19AB0129C03133803086DEC7731B20FCD3182B78C40CF7BC05945103ED0845903014388
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://193.143.1.116/zerarm7n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
23
Origin country :
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Result
Verdict:
UNKNOWN
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 344e735f08f4a4d9072fb62d958855d7042c28cba0db0c3382f7231bf30340a7

(this sample)

  
Delivery method
Distributed via web download

Comments