MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 675490b983022a13fc39278a99372d8abeecbb3301ac412535327dfc32f2afb0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 3
| SHA256 hash: | 675490b983022a13fc39278a99372d8abeecbb3301ac412535327dfc32f2afb0 |
|---|---|
| SHA3-384 hash: | 827dc332da3fa9ffe2b7c46a228a6a8752211dec4028aa2f0d8fc466a4b9b80ec34d8331f01dbb32d8c3d914af384fab |
| SHA1 hash: | cf617fbe55dfdbd7c872d7acc824f5bb9c635707 |
| MD5 hash: | 6f58091a849a7c467af537ef24e2c513 |
| humanhash: | ohio-idaho-beer-happy |
| File name: | 675490b983022a13fc39278a99372d8abeecbb3301ac412535327dfc32f2afb0.sh |
| Download: | download sample |
| File size: | 12'547 bytes |
| First seen: | 2026-02-22 16:45:36 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 96:cCuhmB6csht+O+v1fsn+h4+tIiKqCTyOysuKNpUj4waYvjxlPOSEgXYUcFn0m0F:cCuhK6p4hvZ5m5FoKNpivOX6 |
| TLSH | T11042337B21F08B3297D010C9A2771B614E72960B456624B9F4FE6735AF2DA0371EBB21 |
| Magika | xml |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://38.6.178.140/easy_lan.sh | n/a | n/a | n/a |
| http://222.186.52.155:21541/sh/5053.sh | n/a | n/a | n/a |
| http://5.16.162.140:81/hiddenbin/dvr1.sh | n/a | n/a | elf ua-wget |
Intelligence
File Origin
# of uploads :
1
# of downloads :
57
Origin country :
DEVendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
busybox evasive
Result
Gathering data
Verdict:
Clean
File Type:
text
Status:
terminated
Behavior Graph:
Score:
0%
Verdict:
Benign
File Type:
SCRIPT
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 675490b983022a13fc39278a99372d8abeecbb3301ac412535327dfc32f2afb0
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.