MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 46967cd19c64c4662235dbc105ca6ebc63bceed890ef760860c1dfe496be62a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | 46967cd19c64c4662235dbc105ca6ebc63bceed890ef760860c1dfe496be62a3 |
|---|---|
| SHA3-384 hash: | 0d82d1343b77687453ff5126631201685499d8a7cbdcbe5742040b269119544e5c372713f8bb17b8d86c645b961bab34 |
| SHA1 hash: | 1c0282a1089fdeb41cec191fd2c7876fc530d2d9 |
| MD5 hash: | 3459859d6047536b34180ff1dcb3a551 |
| humanhash: | coffee-bacon-uranus-kitten |
| File name: | w.sh |
| Download: | download sample |
| File size: | 1'272 bytes |
| First seen: | 2025-07-10 17:41:52 UTC |
| Last seen: | 2025-07-11 03:45:54 UTC |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 24:PcC3WvcBIpvcuNNIUuiu7vcn4K6jvUmr6vAjG7vTNmB7v/vhlvu6evfgvWV2fHA:0fV2H779cmr6YjG7LNmB7XplG6eQuV2o |
| TLSH | T11F2144C90F6380438A3C4F31F45B87B92A8E45E3F4E4EE9561CD5CB35288B24B031E16 |
| Magika | txt |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://196.251.116.143/HBTs/top1miku.arm | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.arm5 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.arm6 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.arm7 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.m68k | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.mips | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.mpsl | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.ppc | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.sh4 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.spc | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.x86 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.x86_64 | n/a | n/a | elf ua-wget |
Intelligence
File Origin
# of uploads :
2
# of downloads :
25
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
92.5%
Link:
Tags:
hype sage
Verdict:
Unknown
Threat level:
2.5/10
Confidence:
100%
Status:
terminated
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-07-10 17:42:16 UTC
File Type:
Text (Shell)
AV detection:
13 of 23 (56.52%)
Threat level:
3/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 46967cd19c64c4662235dbc105ca6ebc63bceed890ef760860c1dfe496be62a3
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.