MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 465af65497a66bc16a8526dc1c2015be963a433e8a3348aa9b4aa2bfa1e94a7e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 465af65497a66bc16a8526dc1c2015be963a433e8a3348aa9b4aa2bfa1e94a7e
SHA3-384 hash: 54a818d5062612dbf307a24dbc678da1468466e3061bbe37b301ba5f5e332c1416fa176e2c439fd76b65d8da0239c01d
SHA1 hash: 1f760038da9e0a5523aef75a230801d3d458ba16
MD5 hash: 57520521b277f2f7f593957a29f0bc5d
humanhash: charlie-mango-mike-pizza
File name:av.sh
Download: download sample
File size:287 bytes
First seen:2025-07-10 22:56:25 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:aSF5U3Vg1jakF5U3VosoE3cRF5U3Vma0LKif:j7UFg1L7UFXoOk7UFma0LKs
TLSH T1D7D012D4F53326B30E5F5D0BB372482D24B6B0CC881293D0795F80ADD5B4B45F430209
Magika shell
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
22
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
busybox evasive
Status:
terminated
Behavior Graph:
%3 guuid=fdee3979-1a00-0000-e92f-3e33c4090000 pid=2500 /usr/bin/sudo guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506 /tmp/sample.bin guuid=fdee3979-1a00-0000-e92f-3e33c4090000 pid=2500->guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506 execve guuid=f7d75d7c-1a00-0000-e92f-3e33cc090000 pid=2508 /usr/bin/rm guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=f7d75d7c-1a00-0000-e92f-3e33cc090000 pid=2508 execve guuid=089a9c7c-1a00-0000-e92f-3e33ce090000 pid=2510 /usr/bin/busybox net send-data write-file guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=089a9c7c-1a00-0000-e92f-3e33ce090000 pid=2510 execve guuid=da72d78d-1a00-0000-e92f-3e33f8090000 pid=2552 /usr/bin/chmod guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=da72d78d-1a00-0000-e92f-3e33f8090000 pid=2552 execve guuid=fcf3598e-1a00-0000-e92f-3e33fa090000 pid=2554 /usr/bin/dash guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=fcf3598e-1a00-0000-e92f-3e33fa090000 pid=2554 clone guuid=3701a08f-1a00-0000-e92f-3e33ff090000 pid=2559 /usr/bin/rm guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=3701a08f-1a00-0000-e92f-3e33ff090000 pid=2559 execve guuid=452cdb8f-1a00-0000-e92f-3e33000a0000 pid=2560 /usr/bin/busybox net send-data write-file guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=452cdb8f-1a00-0000-e92f-3e33000a0000 pid=2560 execve guuid=290a68a3-1a00-0000-e92f-3e332f0a0000 pid=2607 /usr/bin/chmod guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=290a68a3-1a00-0000-e92f-3e332f0a0000 pid=2607 execve guuid=8bb2c6a3-1a00-0000-e92f-3e33320a0000 pid=2610 /usr/bin/dash guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=8bb2c6a3-1a00-0000-e92f-3e33320a0000 pid=2610 clone guuid=a6d47ba4-1a00-0000-e92f-3e33370a0000 pid=2615 /usr/bin/rm guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=a6d47ba4-1a00-0000-e92f-3e33370a0000 pid=2615 execve guuid=32a9bfa4-1a00-0000-e92f-3e33390a0000 pid=2617 /usr/bin/busybox net send-data write-file guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=32a9bfa4-1a00-0000-e92f-3e33390a0000 pid=2617 execve guuid=01cf97b7-1a00-0000-e92f-3e336f0a0000 pid=2671 /usr/bin/chmod guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=01cf97b7-1a00-0000-e92f-3e336f0a0000 pid=2671 execve guuid=184ce5b7-1a00-0000-e92f-3e33710a0000 pid=2673 /usr/bin/dash guuid=cf02fa7b-1a00-0000-e92f-3e33ca090000 pid=2506->guuid=184ce5b7-1a00-0000-e92f-3e33710a0000 pid=2673 clone a47f54eb-1dd1-5e51-b3db-feafa905bd57 185.208.158.140:21 guuid=089a9c7c-1a00-0000-e92f-3e33ce090000 pid=2510->a47f54eb-1dd1-5e51-b3db-feafa905bd57 send: 72B 49d545d4-09fe-538c-8d1c-2e3b4672c21c 185.208.158.140:46623 guuid=089a9c7c-1a00-0000-e92f-3e33ce090000 pid=2510->49d545d4-09fe-538c-8d1c-2e3b4672c21c con guuid=452cdb8f-1a00-0000-e92f-3e33000a0000 pid=2560->a47f54eb-1dd1-5e51-b3db-feafa905bd57 send: 70B 624346ce-bb37-5e6d-878f-c727deb0d8bb 185.208.158.140:40783 guuid=452cdb8f-1a00-0000-e92f-3e33000a0000 pid=2560->624346ce-bb37-5e6d-878f-c727deb0d8bb con guuid=32a9bfa4-1a00-0000-e92f-3e33390a0000 pid=2617->a47f54eb-1dd1-5e51-b3db-feafa905bd57 send: 72B a02cf2bb-4ced-58f3-a4b9-d35e183d051f 185.208.158.140:40397 guuid=32a9bfa4-1a00-0000-e92f-3e33390a0000 pid=2617->a02cf2bb-4ced-58f3-a4b9-d35e183d051f con
Threat name:
Script.Downloader.Heuristic
Status:
Malicious
First seen:
2025-07-10 22:57:14 UTC
File Type:
Text (Shell)
AV detection:
3 of 23 (13.04%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 465af65497a66bc16a8526dc1c2015be963a433e8a3348aa9b4aa2bfa1e94a7e

(this sample)

  
Delivery method
Distributed via web download

Comments