MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4c7e928c6b433f2ad7adf7c94c164be2ce2947aa8375fca3fb5be8b2d1e35adf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 4
| SHA256 hash: | 4c7e928c6b433f2ad7adf7c94c164be2ce2947aa8375fca3fb5be8b2d1e35adf |
|---|---|
| SHA3-384 hash: | 8b96cd82a2f40b25376ccc8da2963043ff3950cda6f46ab803579cd4a9b089e58ce269f26ab8eeeec12cd35492d66617 |
| SHA1 hash: | 09def98546685602579ab632bad8a747cc30b630 |
| MD5 hash: | 99c13ec1374a93f8045635bd8a247203 |
| humanhash: | bakerloo-quiet-oklahoma-fourteen |
| File name: | 4c7e928c6b433f2ad7adf7c94c164be2ce2947aa8375fca3fb5be8b2d1e35adf.sh |
| Download: | download sample |
| File size: | 2'487 bytes |
| First seen: | 2026-02-22 13:18:46 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 48:cniRxu60DkLlwnIwG9lryrIpklrAZF/7lwnGCmp7lwnIOR6Llrb:cWu54K7GKYhb |
| TLSH | T1465126B430F14C732E256580F37727A56B73A85305A3728C34DD1E396F8AB02A5BF412 |
| Magika | xml |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://59.127.196.190:880/d.sh | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
6
Origin country :
DEVendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
busybox evasive
Result
Gathering data
Status:
terminated
Behavior Graph:
Score:
0%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Text.Browser.Generic
Status:
Suspicious
First seen:
2026-02-22 13:21:51 UTC
File Type:
Text (Shell)
AV detection:
1 of 36 (2.78%)
Threat level:
4/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 4c7e928c6b433f2ad7adf7c94c164be2ce2947aa8375fca3fb5be8b2d1e35adf
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.