MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4a2186ed17f0a9b0e880f799ebc117efa5f0d3aa4fb5a7ae912cfae59474e989. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4a2186ed17f0a9b0e880f799ebc117efa5f0d3aa4fb5a7ae912cfae59474e989
SHA3-384 hash: f814a2ee3a830244fafd3afbcd47c82df49a73d78597fa9c56f944a348470f6c868a49136706440cf7b92fe55b260eff
SHA1 hash: 76d264bd86e8691003fa435427ffcdc4085a821f
MD5 hash: 3e634b5fd7b4e336d583bceea6430b44
humanhash: zebra-steak-three-carpet
File name:1l.txt
Download: download sample
File size:185 bytes
First seen:2026-01-19 16:08:19 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:QnQzanFCKl2f0FpFhCNTTLTeURJXiFn9F1mDRTTLTeURJXieoOdQAQZFXbLRF:lOnFflE0FpGfKF9FM1fK7ACFP
TLSH T112C0128910E061365EA2DF2E377644447040E4D25CCD2F10D0DC64D4A49CD1CE144B93
Magika shell
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
23
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive masquerade
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=00fa2ecd-1600-0000-4a12-b35ea90c0000 pid=3241 /usr/bin/sudo guuid=42cd41cf-1600-0000-4a12-b35eab0c0000 pid=3243 /tmp/sample.bin guuid=00fa2ecd-1600-0000-4a12-b35ea90c0000 pid=3241->guuid=42cd41cf-1600-0000-4a12-b35eab0c0000 pid=3243 execve guuid=78c38acf-1600-0000-4a12-b35eac0c0000 pid=3244 /usr/bin/wget guuid=42cd41cf-1600-0000-4a12-b35eab0c0000 pid=3243->guuid=78c38acf-1600-0000-4a12-b35eac0c0000 pid=3244 execve
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 4a2186ed17f0a9b0e880f799ebc117efa5f0d3aa4fb5a7ae912cfae59474e989

(this sample)

  
Delivery method
Distributed via web download

Comments