MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 76013487f3735ac4a83381a9533aec048e2a17868398e410b6999ccdbaf1be74. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 76013487f3735ac4a83381a9533aec048e2a17868398e410b6999ccdbaf1be74
SHA3-384 hash: 7eae45436b780b971b2c71b571a3dd43623823833c90a160cc35e925afd93a87975898b04fef8166ace3848676b9f26b
SHA1 hash: 3fe07a079ae19f2f1ce251881da0a1a1d2fde25f
MD5 hash: 7e547ab6941c852824e7aa661883a837
humanhash: ten-delta-ten-zulu
File name:wget.sh
Download: download sample
File size:1'116 bytes
First seen:2025-09-08 15:17:56 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:7dIdvJdIdmdIdxNISdIeKsdIdNdIdQdIdLTDk0dIdoDdIdTkdId7dId9/dIdZxv:1tWZp
TLSH T1802158FE3339150597240A8430760510A2CBC3937BAC9B81F3AC10236D9DACDBE29F2B
Magika asm
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://41.216.189.108/00101010101001/sora.armn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm5n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm6n/an/aelf ua-wget
http://41.216.189.108/bins/sora.arm7n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.m68kn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.mipsn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.mpsln/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.ppcn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.sh4n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.spcn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.x86n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
ps1
First seen:
2025-09-06T14:10:00Z UTC
Last seen:
2025-09-06T14:10:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=01b9457f-1900-0000-899c-5c26af100000 pid=4271 /usr/bin/sudo guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280 /tmp/sample.bin guuid=01b9457f-1900-0000-899c-5c26af100000 pid=4271->guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280 execve guuid=84289081-1900-0000-899c-5c26bb100000 pid=4283 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=84289081-1900-0000-899c-5c26bb100000 pid=4283 execve guuid=9990f187-1900-0000-899c-5c26cc100000 pid=4300 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=9990f187-1900-0000-899c-5c26cc100000 pid=4300 execve guuid=96d93c88-1900-0000-899c-5c26d0100000 pid=4304 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=96d93c88-1900-0000-899c-5c26d0100000 pid=4304 clone guuid=52604e88-1900-0000-899c-5c26d1100000 pid=4305 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=52604e88-1900-0000-899c-5c26d1100000 pid=4305 execve guuid=8a3ea28b-1900-0000-899c-5c26de100000 pid=4318 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=8a3ea28b-1900-0000-899c-5c26de100000 pid=4318 execve guuid=c37aeb8b-1900-0000-899c-5c26e0100000 pid=4320 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=c37aeb8b-1900-0000-899c-5c26e0100000 pid=4320 clone guuid=576bfd8b-1900-0000-899c-5c26e1100000 pid=4321 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=576bfd8b-1900-0000-899c-5c26e1100000 pid=4321 execve guuid=b9481590-1900-0000-899c-5c26f2100000 pid=4338 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=b9481590-1900-0000-899c-5c26f2100000 pid=4338 execve guuid=70805190-1900-0000-899c-5c26f4100000 pid=4340 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=70805190-1900-0000-899c-5c26f4100000 pid=4340 clone guuid=294a7b90-1900-0000-899c-5c26f5100000 pid=4341 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=294a7b90-1900-0000-899c-5c26f5100000 pid=4341 execve guuid=b3ac8c93-1900-0000-899c-5c2604110000 pid=4356 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=b3ac8c93-1900-0000-899c-5c2604110000 pid=4356 execve guuid=014dc593-1900-0000-899c-5c2606110000 pid=4358 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=014dc593-1900-0000-899c-5c2606110000 pid=4358 clone guuid=8f05d193-1900-0000-899c-5c2607110000 pid=4359 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=8f05d193-1900-0000-899c-5c2607110000 pid=4359 execve guuid=9d0f2b97-1900-0000-899c-5c2619110000 pid=4377 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=9d0f2b97-1900-0000-899c-5c2619110000 pid=4377 execve guuid=90516597-1900-0000-899c-5c261d110000 pid=4381 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=90516597-1900-0000-899c-5c261d110000 pid=4381 clone guuid=09ea7297-1900-0000-899c-5c261e110000 pid=4382 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=09ea7297-1900-0000-899c-5c261e110000 pid=4382 execve guuid=8199999a-1900-0000-899c-5c262e110000 pid=4398 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=8199999a-1900-0000-899c-5c262e110000 pid=4398 execve guuid=38a6db9a-1900-0000-899c-5c2630110000 pid=4400 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=38a6db9a-1900-0000-899c-5c2630110000 pid=4400 clone guuid=1f09e99a-1900-0000-899c-5c2631110000 pid=4401 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=1f09e99a-1900-0000-899c-5c2631110000 pid=4401 execve guuid=ecd2b39e-1900-0000-899c-5c2645110000 pid=4421 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=ecd2b39e-1900-0000-899c-5c2645110000 pid=4421 execve guuid=b3d0f79e-1900-0000-899c-5c2647110000 pid=4423 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=b3d0f79e-1900-0000-899c-5c2647110000 pid=4423 clone guuid=b021019f-1900-0000-899c-5c2649110000 pid=4425 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=b021019f-1900-0000-899c-5c2649110000 pid=4425 execve guuid=53931ca2-1900-0000-899c-5c2655110000 pid=4437 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=53931ca2-1900-0000-899c-5c2655110000 pid=4437 execve guuid=429c59a2-1900-0000-899c-5c2656110000 pid=4438 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=429c59a2-1900-0000-899c-5c2656110000 pid=4438 clone guuid=0a3b66a2-1900-0000-899c-5c2657110000 pid=4439 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=0a3b66a2-1900-0000-899c-5c2657110000 pid=4439 execve guuid=7b7da2a5-1900-0000-899c-5c2661110000 pid=4449 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=7b7da2a5-1900-0000-899c-5c2661110000 pid=4449 execve guuid=a9d6dda5-1900-0000-899c-5c2662110000 pid=4450 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=a9d6dda5-1900-0000-899c-5c2662110000 pid=4450 clone guuid=d07100a6-1900-0000-899c-5c2663110000 pid=4451 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=d07100a6-1900-0000-899c-5c2663110000 pid=4451 execve guuid=44e88da9-1900-0000-899c-5c2677110000 pid=4471 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=44e88da9-1900-0000-899c-5c2677110000 pid=4471 execve guuid=b45bd0a9-1900-0000-899c-5c267b110000 pid=4475 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=b45bd0a9-1900-0000-899c-5c267b110000 pid=4475 clone guuid=9d44e7a9-1900-0000-899c-5c267c110000 pid=4476 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=9d44e7a9-1900-0000-899c-5c267c110000 pid=4476 execve guuid=28bbfdac-1900-0000-899c-5c268e110000 pid=4494 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=28bbfdac-1900-0000-899c-5c268e110000 pid=4494 execve guuid=1ddf38ad-1900-0000-899c-5c2690110000 pid=4496 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=1ddf38ad-1900-0000-899c-5c2690110000 pid=4496 clone guuid=dbd741ad-1900-0000-899c-5c2691110000 pid=4497 /usr/bin/wget net send-data guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=dbd741ad-1900-0000-899c-5c2691110000 pid=4497 execve guuid=b7315db0-1900-0000-899c-5c26a0110000 pid=4512 /usr/bin/chmod guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=b7315db0-1900-0000-899c-5c26a0110000 pid=4512 execve guuid=3e6f99b0-1900-0000-899c-5c26a2110000 pid=4514 /usr/bin/dash guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=3e6f99b0-1900-0000-899c-5c26a2110000 pid=4514 clone guuid=7235a4b0-1900-0000-899c-5c26a4110000 pid=4516 /usr/bin/rm delete-file guuid=ded33b81-1900-0000-899c-5c26b8100000 pid=4280->guuid=7235a4b0-1900-0000-899c-5c26a4110000 pid=4516 execve a4e02df3-c7fa-5be2-b410-afe687812c07 41.216.189.108:80 guuid=84289081-1900-0000-899c-5c26bb100000 pid=4283->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 152B guuid=52604e88-1900-0000-899c-5c26d1100000 pid=4305->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 153B guuid=576bfd8b-1900-0000-899c-5c26e1100000 pid=4321->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 153B guuid=294a7b90-1900-0000-899c-5c26f5100000 pid=4341->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 143B guuid=8f05d193-1900-0000-899c-5c2607110000 pid=4359->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 153B guuid=09ea7297-1900-0000-899c-5c261e110000 pid=4382->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 153B guuid=1f09e99a-1900-0000-899c-5c2631110000 pid=4401->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 153B guuid=b021019f-1900-0000-899c-5c2649110000 pid=4425->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 152B guuid=0a3b66a2-1900-0000-899c-5c2657110000 pid=4439->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 152B guuid=d07100a6-1900-0000-899c-5c2663110000 pid=4451->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 152B guuid=9d44e7a9-1900-0000-899c-5c267c110000 pid=4476->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 152B guuid=dbd741ad-1900-0000-899c-5c2691110000 pid=4497->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 155B
Threat name:
Document-HTML.Downloader.Heuristic
Status:
Malicious
First seen:
2025-09-06 19:07:00 UTC
File Type:
Text (Shell)
AV detection:
17 of 38 (44.74%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 76013487f3735ac4a83381a9533aec048e2a17868398e410b6999ccdbaf1be74

(this sample)

  
Delivery method
Distributed via web download

Comments