MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 49f8f459aa8ffaa6c93a58a5234c1f94172d2d9b3737db129c43fab53c777ac7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 49f8f459aa8ffaa6c93a58a5234c1f94172d2d9b3737db129c43fab53c777ac7
SHA3-384 hash: e9b11a76a45cdf55cecd3980302e9795e3d537225c612d1de35104f3ed354f522dbaf72757265c1491aeb52f2d1fef60
SHA1 hash: 9e92bc36d77332b10ecda58ef9a19b10629f3f51
MD5 hash: 46af1e43887e5597b4cab9d818fda4da
humanhash: ink-vegan-finch-iowa
File name:w.sh
Download: download sample
File size:1'114 bytes
First seen:2025-11-29 10:11:29 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:2RDNNI937FK8G56f27dN6x79rlH0JgTHR:2RKFhAH/Q9rlH0qTx
TLSH T1962110DEB6A4A1138C8D4DD4B06988C6728D8AD0B1310BCCB74944F7D9CEB1D7249F1A
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.186.26.202/bins/hoho.armn/an/aelf ua-wget
http://185.186.26.202/bins/hoho.arm5n/an/aelf ua-wget
http://185.186.26.202/bins/hoho.arm6n/an/aelf ua-wget
http://185.186.26.202/bins/hoho.arm7n/an/aelf ua-wget
http://185.186.26.202/bins/hoho.m68kn/an/aelf ua-wget
http://185.186.26.202/bins/hoho.mipsn/an/aelf ua-wget
http://185.186.26.202/bins/hoho.mpsln/an/aelf ua-wget
http://185.186.26.202/bins/hoho.ppcn/an/aelf ua-wget
http://185.186.26.202/bins/hoho.sh4n/an/aelf ua-wget
http://185.186.26.202/bins/hoho.spcn/an/aelf ua-wget
http://185.186.26.202/bins/hoho.x86n/an/aelf ua-wget
http://185.186.26.202/bins/hoho.x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
25
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox mirai
Result
Gathering data
Verdict:
Malicious
File Type:
text
First seen:
2025-11-29T06:23:00Z UTC
Last seen:
2025-11-29T06:41:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-11-29 00:28:31 UTC
File Type:
Text (Shell)
AV detection:
13 of 36 (36.11%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 49f8f459aa8ffaa6c93a58a5234c1f94172d2d9b3737db129c43fab53c777ac7

(this sample)

  
Delivery method
Distributed via web download

Comments