MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3eccc5f786b95dc991aab99a98414d03f7033154ce8c682079e15f7dbb27735b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 3eccc5f786b95dc991aab99a98414d03f7033154ce8c682079e15f7dbb27735b
SHA3-384 hash: 0d3d310b517c1c164b09bf605b3184972e3dcd3d35ecc92b1abc16083dcb79e760a88e5530e846a9a5156cb2926cb34a
SHA1 hash: c1750a10df8d6285972bc7eedc88ced98e190ef1
MD5 hash: 5cb765ed8ea6ff5339db68b0c1827357
humanhash: johnny-mobile-nine-autumn
File name:xc.sh
Download: download sample
File size:706 bytes
First seen:2026-02-03 18:31:43 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:SdT8w8T58TK8VndT8N8K8H8wdlO77khdlHG7Bgdl6dJ7GS6dlh87PfjzT:7TTiNw25cMOPklHG7B8oxGSmh87Xjv
TLSH T1DB01ED6F3312EB92CA3CA91D32167554F1F797799B7E8B885A4000E6C489A7C309793B
Magika batch
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Result
Gathering data
Verdict:
Malicious
File Type:
text
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=c486cdc0-1e00-0000-c724-1b996f0b0000 pid=2927 /usr/bin/sudo guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932 /tmp/sample.bin guuid=c486cdc0-1e00-0000-c724-1b996f0b0000 pid=2927->guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932 execve guuid=4b7b02c3-1e00-0000-c724-1b99750b0000 pid=2933 /usr/bin/wget net send-data write-file guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=4b7b02c3-1e00-0000-c724-1b99750b0000 pid=2933 execve guuid=f2935dce-1e00-0000-c724-1b998f0b0000 pid=2959 /usr/bin/chmod guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=f2935dce-1e00-0000-c724-1b998f0b0000 pid=2959 execve guuid=9d58a1ce-1e00-0000-c724-1b99910b0000 pid=2961 /usr/bin/dash guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=9d58a1ce-1e00-0000-c724-1b99910b0000 pid=2961 clone guuid=8b883fcf-1e00-0000-c724-1b99940b0000 pid=2964 /usr/bin/rm guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=8b883fcf-1e00-0000-c724-1b99940b0000 pid=2964 execve guuid=c6a293cf-1e00-0000-c724-1b99950b0000 pid=2965 /usr/bin/wget net send-data write-file guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=c6a293cf-1e00-0000-c724-1b99950b0000 pid=2965 execve guuid=faf0cfd9-1e00-0000-c724-1b999e0b0000 pid=2974 /usr/bin/chmod guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=faf0cfd9-1e00-0000-c724-1b999e0b0000 pid=2974 execve guuid=042c5dda-1e00-0000-c724-1b99a00b0000 pid=2976 /usr/bin/dash guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=042c5dda-1e00-0000-c724-1b99a00b0000 pid=2976 clone guuid=2f8cdeda-1e00-0000-c724-1b99a30b0000 pid=2979 /usr/bin/rm guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=2f8cdeda-1e00-0000-c724-1b99a30b0000 pid=2979 execve guuid=c67753db-1e00-0000-c724-1b99a50b0000 pid=2981 /usr/bin/wget net send-data write-file guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=c67753db-1e00-0000-c724-1b99a50b0000 pid=2981 execve guuid=010f5fe4-1e00-0000-c724-1b99b40b0000 pid=2996 /usr/bin/chmod guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=010f5fe4-1e00-0000-c724-1b99b40b0000 pid=2996 execve guuid=a6d0d9e4-1e00-0000-c724-1b99b60b0000 pid=2998 /usr/bin/dash guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=a6d0d9e4-1e00-0000-c724-1b99b60b0000 pid=2998 clone guuid=b42273e5-1e00-0000-c724-1b99b90b0000 pid=3001 /usr/bin/rm guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=b42273e5-1e00-0000-c724-1b99b90b0000 pid=3001 execve guuid=2705dae5-1e00-0000-c724-1b99bb0b0000 pid=3003 /usr/bin/wget net send-data write-file guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=2705dae5-1e00-0000-c724-1b99bb0b0000 pid=3003 execve guuid=dd6eccee-1e00-0000-c724-1b99cc0b0000 pid=3020 /usr/bin/chmod guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=dd6eccee-1e00-0000-c724-1b99cc0b0000 pid=3020 execve guuid=a5e8b7ef-1e00-0000-c724-1b99ce0b0000 pid=3022 /usr/bin/dash guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=a5e8b7ef-1e00-0000-c724-1b99ce0b0000 pid=3022 clone guuid=87e6d3f1-1e00-0000-c724-1b99d30b0000 pid=3027 /usr/bin/rm guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=87e6d3f1-1e00-0000-c724-1b99d30b0000 pid=3027 execve guuid=968b3ef2-1e00-0000-c724-1b99d50b0000 pid=3029 /usr/bin/wget net send-data write-file guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=968b3ef2-1e00-0000-c724-1b99d50b0000 pid=3029 execve guuid=0b606efe-1e00-0000-c724-1b99e80b0000 pid=3048 /usr/bin/chmod guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=0b606efe-1e00-0000-c724-1b99e80b0000 pid=3048 execve guuid=311cc5fe-1e00-0000-c724-1b99e90b0000 pid=3049 /usr/bin/dash guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=311cc5fe-1e00-0000-c724-1b99e90b0000 pid=3049 clone guuid=22e562ff-1e00-0000-c724-1b99ec0b0000 pid=3052 /usr/bin/rm guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=22e562ff-1e00-0000-c724-1b99ec0b0000 pid=3052 execve guuid=7f9ffcff-1e00-0000-c724-1b99ed0b0000 pid=3053 /usr/bin/wget net send-data write-file guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=7f9ffcff-1e00-0000-c724-1b99ed0b0000 pid=3053 execve guuid=d82b200b-1f00-0000-c724-1b99000c0000 pid=3072 /usr/bin/chmod guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=d82b200b-1f00-0000-c724-1b99000c0000 pid=3072 execve guuid=15d15c0b-1f00-0000-c724-1b99010c0000 pid=3073 /usr/bin/dash guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=15d15c0b-1f00-0000-c724-1b99010c0000 pid=3073 clone guuid=7703840c-1f00-0000-c724-1b99060c0000 pid=3078 /usr/bin/rm guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=7703840c-1f00-0000-c724-1b99060c0000 pid=3078 execve guuid=cbabc90c-1f00-0000-c724-1b99070c0000 pid=3079 /usr/bin/rm guuid=9d42c9c2-1e00-0000-c724-1b99740b0000 pid=2932->guuid=cbabc90c-1f00-0000-c724-1b99070c0000 pid=3079 execve 07f980ea-6c7d-59f9-90bf-dda55e295103 185.242.3.143:80 guuid=4b7b02c3-1e00-0000-c724-1b99750b0000 pid=2933->07f980ea-6c7d-59f9-90bf-dda55e295103 send: 139B guuid=c6a293cf-1e00-0000-c724-1b99950b0000 pid=2965->07f980ea-6c7d-59f9-90bf-dda55e295103 send: 141B guuid=c67753db-1e00-0000-c724-1b99a50b0000 pid=2981->07f980ea-6c7d-59f9-90bf-dda55e295103 send: 141B guuid=2705dae5-1e00-0000-c724-1b99bb0b0000 pid=3003->07f980ea-6c7d-59f9-90bf-dda55e295103 send: 141B guuid=968b3ef2-1e00-0000-c724-1b99d50b0000 pid=3029->07f980ea-6c7d-59f9-90bf-dda55e295103 send: 141B guuid=7f9ffcff-1e00-0000-c724-1b99ed0b0000 pid=3053->07f980ea-6c7d-59f9-90bf-dda55e295103 send: 141B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2026-02-03 18:23:12 UTC
File Type:
Text (Shell)
AV detection:
11 of 36 (30.56%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 3eccc5f786b95dc991aab99a98414d03f7033154ce8c682079e15f7dbb27735b

(this sample)

  
Delivery method
Distributed via web download

Comments