MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3649cb41a53aed9e4cee3e8027f5eea122a304fb3ebb1d5994b4e5f478e3e5e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 3649cb41a53aed9e4cee3e8027f5eea122a304fb3ebb1d5994b4e5f478e3e5e3
SHA3-384 hash: 9a8d122ff9b1d9b33644f7c3300af0a77d4df366818dd4819fdac118d8a14295ff94882d6dbea22d5de614986f8fd1ea
SHA1 hash: 8ef2f3ba8a0d63d1f40194eb5eb45a9584d9bc5a
MD5 hash: 11fe53d5738a1010adc780dfa01f02cf
humanhash: bluebird-maine-salami-paris
File name:node.sh
Download: download sample
File size:193 bytes
First seen:2025-12-23 22:09:33 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:cLMfEgJAdR+DEBsKPvAMfEgJAdR+DXgDe0L0zn:cLMfEgJ0IDEB7vAMfEgJ0IDb04z
TLSH T184C022D3006E00813F08D9EC304D31D4A00D818114C281CCE09D14E7A0561B2E42F4A0
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
https://cdn.network-endpoint-microsoft.com/lodeyn/an/aelf ua-wget
https://cdn.network-endpoint-microsoft.com/genesis.noden/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=718e595e-1900-0000-f9d9-f926240f0000 pid=3876 /usr/bin/sudo guuid=bec51060-1900-0000-f9d9-f9262d0f0000 pid=3885 /tmp/sample.bin guuid=718e595e-1900-0000-f9d9-f926240f0000 pid=3876->guuid=bec51060-1900-0000-f9d9-f9262d0f0000 pid=3885 execve guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3887 /usr/bin/curl net send-data write-file guuid=bec51060-1900-0000-f9d9-f9262d0f0000 pid=3885->guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3887 execve guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3965 /usr/bin/curl net send-data write-file guuid=bec51060-1900-0000-f9d9-f9262d0f0000 pid=3885->guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3965 execve guuid=bd789589-1900-0000-f9d9-f926c50f0000 pid=4037 /usr/bin/chmod guuid=bec51060-1900-0000-f9d9-f9262d0f0000 pid=3885->guuid=bd789589-1900-0000-f9d9-f926c50f0000 pid=4037 execve guuid=3a53d489-1900-0000-f9d9-f926c70f0000 pid=4039 /tmp/.l guuid=bec51060-1900-0000-f9d9-f9262d0f0000 pid=3885->guuid=3a53d489-1900-0000-f9d9-f926c70f0000 pid=4039 execve guuid=6e10268a-1900-0000-f9d9-f926c90f0000 pid=4041 /usr/bin/rm delete-file guuid=bec51060-1900-0000-f9d9-f9262d0f0000 pid=3885->guuid=6e10268a-1900-0000-f9d9-f926c90f0000 pid=4041 execve 7553341d-484e-550d-b7a1-78d8ba608df9 cdn.network-endpoint-microsoft.com:443 guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3887->7553341d-484e-550d-b7a1-78d8ba608df9 send: 795B guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3903 /usr/bin/curl dns net send-data guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3887->guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3903 clone guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3903->7553341d-484e-550d-b7a1-78d8ba608df9 con 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=d5c29160-1900-0000-f9d9-f9262f0f0000 pid=3903->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 104B guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3965->7553341d-484e-550d-b7a1-78d8ba608df9 send: 799B guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3981 /usr/bin/curl dns net send-data guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3965->guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3981 clone guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3981->7553341d-484e-550d-b7a1-78d8ba608df9 con guuid=ffcca878-1900-0000-f9d9-f9267d0f0000 pid=3981->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 104B
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 3649cb41a53aed9e4cee3e8027f5eea122a304fb3ebb1d5994b4e5f478e3e5e3

(this sample)

  
Delivery method
Distributed via web download

Comments