MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6eadbe57e734adbb395b046f0125d73bb03979b35cef799e2cbb44c0d3447aab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 6eadbe57e734adbb395b046f0125d73bb03979b35cef799e2cbb44c0d3447aab |
|---|---|
| SHA3-384 hash: | c216f5dc63823a7e4a9e01b171797171a149c788fa25affe5622fc52a3de7ad655cdbf338d9c9e8cd5da739819a20ef4 |
| SHA1 hash: | 64c2b74e7acf648cdb673653f927c611b2df0e2a |
| MD5 hash: | 9474850297844f973885ee95c840e225 |
| humanhash: | violet-september-blossom-golf |
| File name: | c.sh |
| Download: | download sample |
| File size: | 1'293 bytes |
| First seen: | 2026-01-17 17:26:35 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 12:3J34Hv5U0gv5h8NINMPv53LKUmv5av5tHX+v50jv5VW7NGuv5HQTjZv5fzw+uv5e:3J34/NIKKANfkQTvzw+p6A |
| TLSH | T1B3212C9D03E1718AEA130D9D6811C04EB3FEB3E7B7508650AECF5868E0ED2097635A75 |
| Magika | batch |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
Intelligence
File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DEVendor Threat Intelligence
No detections
Detection(s):
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
ps1
First seen:
2026-01-17T14:42:00Z UTC
Last seen:
2026-01-18T14:38:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.cl HEUR:Backdoor.Linux.Mirai.h HEUR:Backdoor.Linux.Mirai.cw HEUR:Backdoor.Linux.Mirai.ba HEUR:Backdoor.Linux.Mirai.b
Status:
terminated
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Verdict:
Malicious
Threat:
Backdoor.Linux.Mirai
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2026-01-17 08:31:24 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
3/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 6eadbe57e734adbb395b046f0125d73bb03979b35cef799e2cbb44c0d3447aab
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.