MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3f345775f6eb3fd8533ede6fbe49f26a3e5294818a4b26f6bda9e8131ab6bb25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 4
| SHA256 hash: | 3f345775f6eb3fd8533ede6fbe49f26a3e5294818a4b26f6bda9e8131ab6bb25 |
|---|---|
| SHA3-384 hash: | 961cd5cb0bae705416e676469660b4bf302275af20f40f9047b64a1cf83826e912f2a8ca05ad0a4cecec88124caacf96 |
| SHA1 hash: | e54c5c599426a469c4dc84632c1543d28d17af32 |
| MD5 hash: | 778129d666a31ee75328ed50be86a6aa |
| humanhash: | stairway-princess-item-texas |
| File name: | o.xml |
| Download: | download sample |
| File size: | 654 bytes |
| First seen: | 2026-04-14 02:47:12 UTC |
| Last seen: | 2026-04-14 05:47:09 UTC |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 12:FzY8id/7JAC7akxGWi2jX0KTkYBjasQKGwnv:FzY8k1/sWi2jkE1hT |
| TLSH | T110F046DCE1BCCFA219ADCA89F6F05544549190C7E0F56BDAF34E0820AF04E4A3A6334D |
| Magika | xml |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://94.156.152.67:83/x86 | f68c42aa500783d6986c77a09c242ab345bda1ed7a1f1743df296631d2dae229 | Mirai | elf mirai opendir ua-wget x86 |
Intelligence
File Origin
# of uploads :
39
# of downloads :
8
Origin country :
DEVendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
evasive masquerade opendir
Verdict:
Unknown
File Type:
text
Score:
0%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Script-JS.Trojan.Heuristic
Status:
Malicious
First seen:
2026-04-14 04:01:17 UTC
AV detection:
3 of 38 (7.89%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 3f345775f6eb3fd8533ede6fbe49f26a3e5294818a4b26f6bda9e8131ab6bb25
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.