MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5fa590d5a2bcf0e8957051adcbf097da05fbf6639fcb7b47352260ffe33f36e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: 5fa590d5a2bcf0e8957051adcbf097da05fbf6639fcb7b47352260ffe33f36e9
SHA3-384 hash: 09261a07b347890c4ad4a2b2c95201af214346fa857e22f3cd082df968901ca465a7d2f94c6e481f09e625301ad08d0e
SHA1 hash: 251921e91005124133fadcbe267e7817671c6a86
MD5 hash: 4a418665fe9dc8b8764008a7f6415097
humanhash: river-kansas-alaska-minnesota
File name:oss.sh
Download: download sample
File size:7'223 bytes
First seen:2025-03-18 00:17:53 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 96:L+xT6Wr4fRz6POV0roFdV/spli1AW0A23Br1JPJtHGRu0HvBOzDZ:L+xOWrURzOO//splZWgxhJxtAHvM/Z
TLSH T18EE1316AB55461F0168FC0758ECE28293140400FE854382EB1EEE5B53FF4B8DAAF8675
Magika shell
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-17 20:19:48 UTC
File Type:
Text (Shell)
AV detection:
3 of 22 (13.64%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery execution linux
Behaviour
Command and Scripting Interpreter: Unix Shell
Process Discovery
Reads runtime system information
System Network Configuration Discovery
Checks CPU configuration
Reads CPU attributes
Enumerates running processes
Looks up external IP address via web service
Obfuscated Files or Information
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:RANSOMWARE
Author:ToroGuitar

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 5fa590d5a2bcf0e8957051adcbf097da05fbf6639fcb7b47352260ffe33f36e9

(this sample)

  
Delivery method
Distributed via web download

Comments