MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f5965e5a6f0dde8d32a6f6fdffa60cb02d782633d73be6fdd2e4b786bcdbdaf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 6f5965e5a6f0dde8d32a6f6fdffa60cb02d782633d73be6fdd2e4b786bcdbdaf
SHA3-384 hash: 25851a730b797c5dddd39394e3436fdf3ec8f65c243cabec73b48248251431938e28b4ca32d7c5c0bef77eac7045cb13
SHA1 hash: 7b2f1884af138082509f6d08caaebf260f9c2307
MD5 hash: ff65cde4438f65358dbd78436fe37252
humanhash: stream-lemon-papa-lactose
File name:ukzq6tz7b4.sh
Download: download sample
File size:156 bytes
First seen:2025-10-23 02:07:13 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:WFBIx8sv3uy9Fb+dNMfytPAldymHgmQmk0QQHFxaFOd6HhC:/9vrbsMfytYYpZnoxa0
TLSH T124C08C91483CC43296790A4EB251F1E49A16A4254FF07C91E918840025240740C8F73C
Magika shell
Reporter BlinkzSec
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
https://app4.docknsea.com/App.binn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
63
Origin country :
CZ CZ
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
amos
Status:
terminated
Behavior Graph:
%3 guuid=2b230889-1900-0000-a9ba-8d4f64140000 pid=5220 /usr/bin/sudo guuid=91b8a78c-1900-0000-a9ba-8d4f65140000 pid=5221 /tmp/sample.bin guuid=2b230889-1900-0000-a9ba-8d4f64140000 pid=5220->guuid=91b8a78c-1900-0000-a9ba-8d4f65140000 pid=5221 execve guuid=85061b8d-1900-0000-a9ba-8d4f66140000 pid=5222 /usr/bin/dash guuid=91b8a78c-1900-0000-a9ba-8d4f65140000 pid=5221->guuid=85061b8d-1900-0000-a9ba-8d4f66140000 pid=5222 execve guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5223 /usr/bin/curl net send-data guuid=85061b8d-1900-0000-a9ba-8d4f66140000 pid=5222->guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5223 execve guuid=9ccf709f-1900-0000-a9ba-8d4f69140000 pid=5225 /usr/bin/chmod guuid=85061b8d-1900-0000-a9ba-8d4f66140000 pid=5222->guuid=9ccf709f-1900-0000-a9ba-8d4f69140000 pid=5225 execve ff76dc05-8b9e-5131-a208-2a96a81a4832 app4.docknsea.com:443 guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5223->ff76dc05-8b9e-5131-a208-2a96a81a4832 send: 784B guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5224 /usr/bin/curl dns net send-data guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5223->guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5224 clone guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5224->ff76dc05-8b9e-5131-a208-2a96a81a4832 con 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=382da58d-1900-0000-a9ba-8d4f67140000 pid=5224->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 70B
Threat name:
Text.Browser.Amos
Status:
Malicious
First seen:
2025-10-22 20:45:51 UTC
File Type:
Text (Shell)
AV detection:
4 of 36 (11.11%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 6f5965e5a6f0dde8d32a6f6fdffa60cb02d782633d73be6fdd2e4b786bcdbdaf

(this sample)

  
Delivery method
Distributed via web download

Comments