MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 73da928950f56620a630ee8432bcb3c1d876face241918342cf6af3bfa2feafa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 8
| SHA256 hash: | 73da928950f56620a630ee8432bcb3c1d876face241918342cf6af3bfa2feafa |
|---|---|
| SHA3-384 hash: | 979b034e43ccf5dadd30ed5d572c7ed1de66b0a4567f450e2c4173aa5a7ffb44d33cf33761d9bd2ed9d0aa8406e4efa3 |
| SHA1 hash: | f6b7f13300368721614e1b3a4b3749f5d541d832 |
| MD5 hash: | 04b7b9b4d33af17fd0b3da5ced5da48c |
| humanhash: | fruit-ack-minnesota-minnesota |
| File name: | re |
| Download: | download sample |
| File size: | 296 bytes |
| First seen: | 2026-01-19 01:20:39 UTC |
| Last seen: | 2026-01-19 21:15:44 UTC |
| File type: | sh |
| MIME type: | text/x-shellscript |
| ssdeep | 6:hftJ+pUKUF2RVYTeinYf53I3k2M3FoF/fkVKhOXqIKXD73IKX+N1IEWYq1IKBK0:ZtJ+jRPEYiHTF0ghsOTh4WYO80 |
| TLSH | T19DE0C28CF853083378748CB9A7D73451950F920A6E06549A72C9620BEAE4E50B050153 |
| TrID | 70.0% (.SH) Linux/UNIX shell script (7000/1) 30.0% (.) Unix-like shebang (var.3) (gen) (3000/1) |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Intelligence
File Origin
# of uploads :
2
# of downloads :
79
Origin country :
DEVendor Threat Intelligence
No detections
Detection(s):
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
Labled as:
Bash.MiraiB.Generic
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-18T20:23:00Z UTC
Last seen:
2026-01-19T12:53:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.Shell.Agent.bi HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.MiraiB
Status:
Malicious
First seen:
2026-01-19 01:19:54 UTC
File Type:
Text (Shell)
AV detection:
17 of 36 (47.22%)
Threat level:
3/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
9/10
Tags:
defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
File and Directory Permissions Modification
Executes dropped EXE
Contacts a large (71902) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.31
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 73da928950f56620a630ee8432bcb3c1d876face241918342cf6af3bfa2feafa
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.