MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3aed01a01092efc0b19ff83c6f7ae0142e32df7c6be04040fe54794bc40fa599. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 3aed01a01092efc0b19ff83c6f7ae0142e32df7c6be04040fe54794bc40fa599
SHA3-384 hash: ec02b6c1a94c4b8faabfcca63fa60c01b75f91b7eb337b5ba3e9cacdb5a0218cea52dedde54e06265d7b9d82b74db81a
SHA1 hash: 542f55a0a1a276d37399dfd751338288ebb74b17
MD5 hash: 8821ba9facf40285a9d6c5d604a3fbae
humanhash: tennessee-asparagus-don-kansas
File name:realtek.sh
Download: download sample
File size:435 bytes
First seen:2026-05-12 19:16:03 UTC
Last seen:2026-05-13 17:47:40 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 6:hoKonv4n4eoKtilLkyGjonxnL3oKtRd/yGjonIFMnrlyKt5Hd2lEy7:g4IPlVGUB8cdqGUhkS2/7
TLSH T181E0ACEB041B2E61C10CBBC6EF50C7549006B6D0F697736A620B9551FC797B0795BB41
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
2
# of downloads :
41
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-05-12T16:23:00Z UTC
Last seen:
2026-05-12T17:50:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-05-12 19:16:31 UTC
File Type:
Text (Shell)
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 3aed01a01092efc0b19ff83c6f7ae0142e32df7c6be04040fe54794bc40fa599

(this sample)

  
Delivery method
Distributed via web download

Comments