MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f945200a5df3549418a926f17e81fa8eb031747f9e271d6c7837f86782d1503. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 6f945200a5df3549418a926f17e81fa8eb031747f9e271d6c7837f86782d1503
SHA3-384 hash: 8ff173114a29a8f25dc3bd17e44e5a7f3dc9a39193e0ff0cc8fcff54b812fe8b4f89d10343d3913fbe61e85cc2d60094
SHA1 hash: f94d4364ca304af4aa78acee1a025cd7ad0454a0
MD5 hash: 9f7032f912da92c90577ebc87aa89e42
humanhash: pip-low-alpha-zebra
File name:w.sh
Download: download sample
File size:510 bytes
First seen:2025-05-02 18:42:03 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:6AEjCA8LqCAKNIl5zACA30LKjCM2CCMqC7iAUn:vET8LUKNI7yiKeW2n
TLSH T1B0F0B4FD2196236A44485E11F02E8908647B9FCA6070CB5E644E34B6B794D30F522F09
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.44/armfd2cf8bb6373bb98a0f19a32d4c393eff037016419a22911e9e1359c9569e30c Miraielf mirai ua-wget
http://213.209.143.44/arm5829188885aebea92bb695e713ffb1b1dd889bb7f59d4774cfd61f0b3be2eb98f Miraielf mirai
http://213.209.143.44/arm632ee9608c05bd0b9e569a4be873e4c82bcb1ad7c63e408c2c43cd3e9859bf4f4 Miraielf mirai
http://213.209.143.44/arm7d272c1dc14542558532ea0b5f242882a062f2f0fe15f1ad51390507972f6f462 Miraielf mirai
http://213.209.143.44/mips2d8559c3a323ebfd0536bf99910632c2b4ce22e557553ad2dd88d63dda06fcc2 Miraielf mirai
http://213.209.143.44/mipsela28ef23eab368ee0cf4c519dc023f8ea21f2ab99e3cb4c2b7961ddefe8d4ba1a Miraielf mirai
http://213.209.143.44/x865b28f780409f28c7947f3984accd20a33bcf043af7a4918082ffa10fbb05b1dd Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Threat name:
Linux.Downloader.SAgnt
Status:
Malicious
First seen:
2025-05-02 18:43:08 UTC
File Type:
Text (Shell)
AV detection:
11 of 24 (45.83%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 6f945200a5df3549418a926f17e81fa8eb031747f9e271d6c7837f86782d1503

(this sample)

  
Delivery method
Distributed via web download

Comments