MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 684f2521235470d19da62f352264ea20c89f2261fc9ffc2f9c41291079ec2e9e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 684f2521235470d19da62f352264ea20c89f2261fc9ffc2f9c41291079ec2e9e
SHA3-384 hash: 2e1a9b0e822d29d6afe4164642e53fd2d8e8e5d88d63d146d8769118250bef02ff6693a7df430357695c2d532a2f99da
SHA1 hash: 228626405ecb4ab4fd8ea67aa8ad9b3387de88fd
MD5 hash: 07b25e0a2df1bec5ea2d908efa684a3d
humanhash: william-pasta-one-september
File name:f
Download: download sample
File size:1'298 bytes
First seen:2025-05-09 23:27:41 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:yRk5zOt+MB0A1DkgSxnkxnmkgSx3xJkgmm0kg2jZEokgm/Nkgi6jn:4k5CEA0OkgOomkgOhJkgekgIZVkg4kg/
TLSH T18521E7CF0158CC71A4409DDD35D35915758E86F96ACBCF8B648E01F9A4CDF0CB291EAA
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.218.87.28/vv/armv4l35c14500814ac5bc2c71312bb1323f3be34afa878c7f06cefb0bf26f983564db Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/armv5ld64ce359bc97c9643e66057dbd0ea9ed69d5272487e873119dc7a01134f852bc Miraielf gafgyt mirai ua-wget
http://94.26.90.217/vv/armv6l176858d674f19ed1c385ebfd952caea9f6a76f4b44828d6b8f21985476a35df0 Miraielf gafgyt mirai ua-wget
http://185.218.87.28/vv/armv7l200e571bc0a6d2562563022dfcc60ac5ac8c2e40eb73a053be8555349a674a69 Miraielf gafgyt mirai ua-wget
http://185.218.87.28/vv/mipsn/an/aelf gafgyt ua-wget
http://185.218.87.28/vv/mipsela49f50fdba0de9c330d0980f6cce815c1525d0800adeab6c3d82a7954923ef02 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive obfuscated
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-05-09 23:30:10 UTC
File Type:
Text (Shell)
AV detection:
7 of 35 (20.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 684f2521235470d19da62f352264ea20c89f2261fc9ffc2f9c41291079ec2e9e

(this sample)

  
Delivery method
Distributed via web download

Comments