MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6d138a98eba358f9eaf2ed87a360abb6d03a1710a83f814808db4ab63d089620. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 4
| SHA256 hash: | 6d138a98eba358f9eaf2ed87a360abb6d03a1710a83f814808db4ab63d089620 |
|---|---|
| SHA3-384 hash: | 86d142a1ff8cd8b87c569657fedaa5b86a76b912921203fbafa270e9e75791a5e26b176e9cb0d1d23ea52f94626608da |
| SHA1 hash: | 5d79af03e375960d08b9a512633ae13cb1cc653e |
| MD5 hash: | 9d27fabe470de4ee8d53fe046d38da29 |
| humanhash: | maryland-paris-princess-paris |
| File name: | c.sh |
| Download: | download sample |
| File size: | 780 bytes |
| First seen: | 2025-11-18 17:40:46 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 24:3J3n9mI94l9MNI7D9UKI9jgi94N9faM9309KtB39Z9Q69mHA:yX5+7gPaoqg |
| TLSH | T13201CC8D217596C21E4C8F0CB06AC09CA6FDB3DA78B49F55F02748F068D92446254BBA |
| Magika | batch |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://139.59.247.208/arm | n/a | n/a | n/a |
| http://139.59.247.208/arm5 | n/a | n/a | n/a |
| http://139.59.247.208/arm6 | n/a | n/a | n/a |
| http://139.59.247.208/arm7 | n/a | n/a | n/a |
| http://139.59.247.208/m68k | n/a | n/a | n/a |
| http://139.59.247.208/mips | n/a | n/a | n/a |
| http://139.59.247.208/mpsl | n/a | n/a | n/a |
| http://139.59.247.208/ppc | n/a | n/a | n/a |
| http://139.59.247.208/sh4 | n/a | n/a | n/a |
| http://139.59.247.208/spc | n/a | n/a | n/a |
| http://139.59.247.208/x86 | n/a | n/a | n/a |
| http://139.59.247.208/x86_64 | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
29
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
mirai
Result
Gathering data
Status:
terminated
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Gathering data
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 6d138a98eba358f9eaf2ed87a360abb6d03a1710a83f814808db4ab63d089620
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.