MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 773bf787b1848b0af1453ecdf14b7ffa9e6fd90794375a55fff781f5947c1916. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 773bf787b1848b0af1453ecdf14b7ffa9e6fd90794375a55fff781f5947c1916
SHA3-384 hash: 52aee7935a5b2437eaf545c815c580ee50a65241bb002b0a22cb80575f752eda47f6703172d8e33e8e4ca87a6624c900
SHA1 hash: 9c7b2ec6c7e4fc8d378a6ea8549da63b66e89c97
MD5 hash: 3a66bc347ebf5ca901600c5b21f46ae2
humanhash: mexico-leopard-march-nine
File name:b.sh
Download: download sample
File size:641 bytes
First seen:2025-08-28 07:33:09 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:CsBXi6ckSLyfsnsBXi6cvNgROSGjsBXi6cOXGjsBXi6cBcGjsBXi6cpe8NI1uSG9:Pi6X4y3i6gN1R6i6O6i6e6i6iNNI8R6s
TLSH T1F1F05EFF08107E20CC99FC373992C8EF502B95D2227A4E8A06CE0737C9AA518F074999
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.121.13.159/nktmipsn/an/aelf ua-wget
http://185.121.13.159/nktmpsln/an/aelf ua-wget
http://185.121.13.159/nktarm4n/an/aelf ua-wget
http://185.121.13.159/nktarm5n/an/aelf ua-wget
http://185.121.13.159/nktarm6n/an/aelf ua-wget
http://185.121.13.159/nktarm7n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
28
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=7444362c-1c00-0000-aa52-875572090000 pid=2418 /usr/bin/sudo guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425 /tmp/sample.bin guuid=7444362c-1c00-0000-aa52-875572090000 pid=2418->guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425 execve guuid=5450342e-1c00-0000-aa52-87557a090000 pid=2426 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=5450342e-1c00-0000-aa52-87557a090000 pid=2426 execve guuid=16d1862e-1c00-0000-aa52-87557b090000 pid=2427 /usr/bin/wget net send-data guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=16d1862e-1c00-0000-aa52-87557b090000 pid=2427 execve guuid=6b2ecb45-1c00-0000-aa52-87559a090000 pid=2458 /usr/bin/chmod guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=6b2ecb45-1c00-0000-aa52-87559a090000 pid=2458 execve guuid=df830f46-1c00-0000-aa52-87559c090000 pid=2460 /usr/bin/dash guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=df830f46-1c00-0000-aa52-87559c090000 pid=2460 clone guuid=a2591e46-1c00-0000-aa52-87559d090000 pid=2461 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=a2591e46-1c00-0000-aa52-87559d090000 pid=2461 execve guuid=b5c75f46-1c00-0000-aa52-87559e090000 pid=2462 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=b5c75f46-1c00-0000-aa52-87559e090000 pid=2462 execve guuid=7a05b846-1c00-0000-aa52-8755a0090000 pid=2464 /usr/bin/wget net send-data guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=7a05b846-1c00-0000-aa52-8755a0090000 pid=2464 execve guuid=1daa404a-1c00-0000-aa52-8755ab090000 pid=2475 /usr/bin/chmod guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=1daa404a-1c00-0000-aa52-8755ab090000 pid=2475 execve guuid=9ecb7a4a-1c00-0000-aa52-8755ac090000 pid=2476 /usr/bin/dash guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=9ecb7a4a-1c00-0000-aa52-8755ac090000 pid=2476 clone guuid=9295894a-1c00-0000-aa52-8755ad090000 pid=2477 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=9295894a-1c00-0000-aa52-8755ad090000 pid=2477 execve guuid=7e24c84a-1c00-0000-aa52-8755af090000 pid=2479 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=7e24c84a-1c00-0000-aa52-8755af090000 pid=2479 execve guuid=d08c1b4b-1c00-0000-aa52-8755b1090000 pid=2481 /usr/bin/wget net send-data guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=d08c1b4b-1c00-0000-aa52-8755b1090000 pid=2481 execve guuid=24b69d4e-1c00-0000-aa52-8755bb090000 pid=2491 /usr/bin/chmod guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=24b69d4e-1c00-0000-aa52-8755bb090000 pid=2491 execve guuid=e4b7dc4e-1c00-0000-aa52-8755bd090000 pid=2493 /usr/bin/dash guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=e4b7dc4e-1c00-0000-aa52-8755bd090000 pid=2493 clone guuid=dde2ed4e-1c00-0000-aa52-8755be090000 pid=2494 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=dde2ed4e-1c00-0000-aa52-8755be090000 pid=2494 execve guuid=e2c75e4f-1c00-0000-aa52-8755bf090000 pid=2495 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=e2c75e4f-1c00-0000-aa52-8755bf090000 pid=2495 execve guuid=a44aba4f-1c00-0000-aa52-8755c0090000 pid=2496 /usr/bin/wget net send-data guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=a44aba4f-1c00-0000-aa52-8755c0090000 pid=2496 execve guuid=67516e53-1c00-0000-aa52-8755ca090000 pid=2506 /usr/bin/chmod guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=67516e53-1c00-0000-aa52-8755ca090000 pid=2506 execve guuid=a931af53-1c00-0000-aa52-8755cc090000 pid=2508 /usr/bin/dash guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=a931af53-1c00-0000-aa52-8755cc090000 pid=2508 clone guuid=14f3c753-1c00-0000-aa52-8755cd090000 pid=2509 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=14f3c753-1c00-0000-aa52-8755cd090000 pid=2509 execve guuid=3fe82b54-1c00-0000-aa52-8755cf090000 pid=2511 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=3fe82b54-1c00-0000-aa52-8755cf090000 pid=2511 execve guuid=52b17754-1c00-0000-aa52-8755d1090000 pid=2513 /usr/bin/wget net send-data guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=52b17754-1c00-0000-aa52-8755d1090000 pid=2513 execve guuid=c8bbc657-1c00-0000-aa52-8755d7090000 pid=2519 /usr/bin/chmod guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=c8bbc657-1c00-0000-aa52-8755d7090000 pid=2519 execve guuid=610d0058-1c00-0000-aa52-8755d8090000 pid=2520 /usr/bin/dash guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=610d0058-1c00-0000-aa52-8755d8090000 pid=2520 clone guuid=7e0f0e58-1c00-0000-aa52-8755d9090000 pid=2521 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=7e0f0e58-1c00-0000-aa52-8755d9090000 pid=2521 execve guuid=fd28ae58-1c00-0000-aa52-8755dc090000 pid=2524 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=fd28ae58-1c00-0000-aa52-8755dc090000 pid=2524 execve guuid=59501a59-1c00-0000-aa52-8755de090000 pid=2526 /usr/bin/wget net send-data guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=59501a59-1c00-0000-aa52-8755de090000 pid=2526 execve guuid=6258275e-1c00-0000-aa52-8755eb090000 pid=2539 /usr/bin/chmod guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=6258275e-1c00-0000-aa52-8755eb090000 pid=2539 execve guuid=3be1765e-1c00-0000-aa52-8755ed090000 pid=2541 /usr/bin/dash guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=3be1765e-1c00-0000-aa52-8755ed090000 pid=2541 clone guuid=6877805e-1c00-0000-aa52-8755ef090000 pid=2543 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=6877805e-1c00-0000-aa52-8755ef090000 pid=2543 execve guuid=3cdeca5e-1c00-0000-aa52-8755f0090000 pid=2544 /usr/bin/rm guuid=9c36ef2d-1c00-0000-aa52-875579090000 pid=2425->guuid=3cdeca5e-1c00-0000-aa52-8755f0090000 pid=2544 execve 46c5cf3c-ed7d-558b-b835-3a135f52a779 185.121.13.159:80 guuid=16d1862e-1c00-0000-aa52-87557b090000 pid=2427->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 136B guuid=7a05b846-1c00-0000-aa52-8755a0090000 pid=2464->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 136B guuid=d08c1b4b-1c00-0000-aa52-8755b1090000 pid=2481->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 136B guuid=a44aba4f-1c00-0000-aa52-8755c0090000 pid=2496->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 136B guuid=52b17754-1c00-0000-aa52-8755d1090000 pid=2513->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 136B guuid=59501a59-1c00-0000-aa52-8755de090000 pid=2526->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 136B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-08-28 06:36:32 UTC
File Type:
Text (Shell)
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 773bf787b1848b0af1453ecdf14b7ffa9e6fd90794375a55fff781f5947c1916

(this sample)

  
Delivery method
Distributed via web download

Comments