MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4dfac6f519d130bc165c1af3a9d9197e8048525750ee4789def32eb04704648e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 4dfac6f519d130bc165c1af3a9d9197e8048525750ee4789def32eb04704648e |
|---|---|
| SHA3-384 hash: | fedcd9587005d1d6e61612fbf3581af4cf59914c8eba735cc246029176319817060702039e8f9681277782b0a8835e53 |
| SHA1 hash: | 07a3fc021f3563589857ae4f46aca371144c7506 |
| MD5 hash: | 50806e84d552294c6f4d539d34aa5f9a |
| humanhash: | saturn-purple-rugby-bravo |
| File name: | wget.sh |
| Download: | download sample |
| File size: | 1'177 bytes |
| First seen: | 2025-07-10 17:13:55 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 24:JaC3baBIeauNNIUuiuYcn4K6AUmrnAjGYTNmBYEhSu6jfFWV2fxv:Y2HqPmrAjGmNmBlT6YV2fp |
| TLSH | T1F7212F8D0F23508B96384F32F45B47A91A8F42D2F5F8EE9162CD1C735588714B035E1B |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://196.251.116.143/HBTs/HBTs/top1miku.arm | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/HBTs/top1miku.arm5 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/HBTs/top1miku.arm6 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.arm7 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.m68k | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.mips | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.mpsl | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.ppc | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.sh4 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.spc | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.x86 | n/a | n/a | elf ua-wget |
| http://196.251.116.143/HBTs/top1miku.x86_64 | n/a | n/a | elf ua-wget |
Intelligence
File Origin
# of uploads :
1
# of downloads :
25
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
92.5%
Link:
Tags:
agent hype sage
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Status:
terminated
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-07-10 17:14:13 UTC
File Type:
Text (Shell)
AV detection:
14 of 23 (60.87%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 4dfac6f519d130bc165c1af3a9d9197e8048525750ee4789def32eb04704648e
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.