MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 46967cd19c64c4662235dbc105ca6ebc63bceed890ef760860c1dfe496be62a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 46967cd19c64c4662235dbc105ca6ebc63bceed890ef760860c1dfe496be62a3
SHA3-384 hash: 0d82d1343b77687453ff5126631201685499d8a7cbdcbe5742040b269119544e5c372713f8bb17b8d86c645b961bab34
SHA1 hash: 1c0282a1089fdeb41cec191fd2c7876fc530d2d9
MD5 hash: 3459859d6047536b34180ff1dcb3a551
humanhash: coffee-bacon-uranus-kitten
File name:w.sh
Download: download sample
File size:1'272 bytes
First seen:2025-07-10 17:41:52 UTC
Last seen:2025-07-11 03:45:54 UTC
File type: sh
MIME type:text/plain
ssdeep 24:PcC3WvcBIpvcuNNIUuiu7vcn4K6jvUmr6vAjG7vTNmB7v/vhlvu6evfgvWV2fHA:0fV2H779cmr6YjG7LNmB7XplG6eQuV2o
TLSH T11F2144C90F6380438A3C4F31F45B87B92A8E45E3F4E4EE9561CD5CB35288B24B031E16
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.116.143/HBTs/top1miku.armn/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.arm5n/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.arm6n/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.arm7n/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.m68kn/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.mipsn/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.mpsln/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.ppcn/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.sh4n/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.spcn/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.x86n/an/aelf ua-wget
http://196.251.116.143/HBTs/top1miku.x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
25
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=f46994c8-1a00-0000-73a8-89ef7c0c0000 pid=3196 /usr/bin/sudo guuid=40d26ccb-1a00-0000-73a8-89ef800c0000 pid=3200 /tmp/sample.bin guuid=f46994c8-1a00-0000-73a8-89ef7c0c0000 pid=3196->guuid=40d26ccb-1a00-0000-73a8-89ef800c0000 pid=3200 execve guuid=77b9b5cb-1a00-0000-73a8-89ef810c0000 pid=3201 /usr/bin/busybox guuid=40d26ccb-1a00-0000-73a8-89ef800c0000 pid=3200->guuid=77b9b5cb-1a00-0000-73a8-89ef810c0000 pid=3201 execve
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-07-10 17:42:16 UTC
File Type:
Text (Shell)
AV detection:
13 of 23 (56.52%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 46967cd19c64c4662235dbc105ca6ebc63bceed890ef760860c1dfe496be62a3

(this sample)

  
Delivery method
Distributed via web download

Comments