MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d7f5dcbbdda3ae9840e08937f02daa2a7f1546777684c4336b10a1fe31ca50c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 6d7f5dcbbdda3ae9840e08937f02daa2a7f1546777684c4336b10a1fe31ca50c
SHA3-384 hash: 165a48de2423850de5b92c386a693e6bf363f03336fbdf268ff4e7ac7f58c9bfaddb0526871c999b6f308c5c243fc877
SHA1 hash: 363a52a9fbbd4f6053e095c2b69c01ba8d89173a
MD5 hash: a345586c6df2b032e5a3d309f9d5e5c9
humanhash: december-berlin-lake-shade
File name:1.sh
Download: download sample
File size:2'178 bytes
First seen:2025-10-09 03:12:35 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:1U4qKcnVWWtzTp9a9Q3gSpVCI8oZJllEy+kXD:S4qKcnVWWtzTp9a9Q3gSpVCI8oZJllEi
TLSH T1834162F6A388C53B14FD87CFBAF4862DA40405BBF49E4B359CF6C81A6488E1C7455A0D
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.252.89.75/bins/morte.arcbd72e0522ddf03337c08230ab26af4d7150683c4f52d09d5017e34a6abba1049 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.arm1dcf2c3cb771cc1c1d8a01e0efc9292b14215518100f3400cf39b378a25f28b7 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.arm5c2358fb878f8cc55ad73fee922f36546f15f2aac638037a053a4e631b1963331 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.arm6424679f11790a028b6d335fdadc5b146b935da1befb1c056f21649a564567448 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.arm7ee84ffa0a0a5b269b8b5db1be3c62a6717bfdae211756df3b32b81673bd7b6fa Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.i686d40cd5b700da6ae217a4e701d497dc19453c9748245f253bf288a21ecdb80086 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.m68ka4016bd76a80622af455da0e6cd610c2172f32bc40601db1160b97740309fbcc Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.mips4702b7ae2d5a1610bd55bb7f2b205614662cbb6afd45bd47caeaa45b3d08db47 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.mpslc7ac62bad7d78143444dff6f3c17664f25f31bc4ba8b3a03dba7ee6790aa0c75 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.ppceaff198827c6dd6272c620938f2f8a2620a2846c4fe1d50d210eb9dde7fc968e Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.sh41b9e2c13f4012fae670c512313bfa25ec335072ea281b407cc5b82efb9ae1f86 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.spc0d99ad98a68c10d75f4a77c08727896bf03ddb3faa08af7b0058691097e04a31 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.x860f25a0e2e70c171855e9cc4d41dffd3a8e0f52f1393f6ce50593a1097897e358 Miraielf mirai ua-wget
http://103.252.89.75/bins/morte.x86_642c9cda6ce94fc0dd45b11312a54e82beacaedb0b7def3698481c22796b338989 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
busybox
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-10-09T06:15:00Z UTC
Last seen:
2025-10-10T19:43:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=c93cd0de-1900-0000-7046-3d7149070000 pid=1865 /usr/bin/sudo guuid=ed755be0-1900-0000-7046-3d714d070000 pid=1869 /tmp/sample.bin guuid=c93cd0de-1900-0000-7046-3d7149070000 pid=1865->guuid=ed755be0-1900-0000-7046-3d714d070000 pid=1869 execve guuid=a41be1e0-1900-0000-7046-3d7150070000 pid=1872 /usr/bin/cp guuid=ed755be0-1900-0000-7046-3d714d070000 pid=1869->guuid=a41be1e0-1900-0000-7046-3d7150070000 pid=1872 execve guuid=377f95e8-1900-0000-7046-3d715b070000 pid=1883 /usr/bin/wget net send-data guuid=ed755be0-1900-0000-7046-3d714d070000 pid=1869->guuid=377f95e8-1900-0000-7046-3d715b070000 pid=1883 execve 9f2f4082-cb6e-5c19-ba17-2b6f4ff8df23 103.252.89.75:80 guuid=377f95e8-1900-0000-7046-3d715b070000 pid=1883->9f2f4082-cb6e-5c19-ba17-2b6f4ff8df23 send: 142B
Threat name:
Script-Shell.Trojan.Vigorf
Status:
Malicious
First seen:
2025-10-09 03:14:32 UTC
File Type:
Text (Shell)
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 6d7f5dcbbdda3ae9840e08937f02daa2a7f1546777684c4336b10a1fe31ca50c

(this sample)

  
Delivery method
Distributed via web download

Comments