MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3f67ba39f72f5e37977ec910f2622ed9fbc5a58ccb9f9f8da7c3a591339015b9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | 3f67ba39f72f5e37977ec910f2622ed9fbc5a58ccb9f9f8da7c3a591339015b9 |
|---|---|
| SHA3-384 hash: | 39b19ab98912e63bbb57af0e1da20f3176e2d385c486e65b1019bfabf5c04596aa5e64c33ead6443509ce67b2fccfeb3 |
| SHA1 hash: | 9ccee4bb13923497c79f4343255e18fb6e72ffa1 |
| MD5 hash: | e32f5981731c7760cd4f8b86e480710d |
| humanhash: | jig-grey-fruit-hotel |
| File name: | gig.sh |
| Download: | download sample |
| File size: | 222 bytes |
| First seen: | 2025-02-24 09:32:35 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 3:L2UiMwWcqR6Wgr1wZFGBzSEyLTUWaXw8Ui9WFKV2UiMwWcqR6Wgr1H8BzSE8eU6V:LFwBWgr1wCIyw7FgFwBWgr1cL1wC |
| TLSH | T19CD0C7C904533D1045486CD73567837F6582C7DC529F4BCF59CC2539A54C764F491B45 |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://193.143.1.116/mips | n/a | n/a | n/a |
| http://193.143.1.116/mpsl | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
27
Origin country :
Vendor Threat Intelligence
Detection(s):
Verdict:
Clean
Score:
99.9%
Link:
Tags:
n/a
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
busybox
Result
Verdict:
UNKNOWN
Score:
1%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-02-24 09:33:16 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 3f67ba39f72f5e37977ec910f2622ed9fbc5a58ccb9f9f8da7c3a591339015b9
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.