MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 778ec852860f474f7172948a24cf5cccdcef4f644db42dceefaff5b08ac556fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 778ec852860f474f7172948a24cf5cccdcef4f644db42dceefaff5b08ac556fd
SHA3-384 hash: 13594349afc696155219063fd50d341d9ba70ab5f671b56a346ded21d852c6162ff12cc7d94d6795df3059e3d791145c
SHA1 hash: 026fd15e2bce1755261e81cc4a3c2f3cb2090a9f
MD5 hash: 80f6533065d72f73099690b5a5229c0c
humanhash: twelve-iowa-alanine-triple
File name:mon.sh
Download: download sample
Signature CoinMiner
File size:5'525 bytes
First seen:2025-09-09 15:59:25 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 96:l06z0cvtwocAUP7DTAiVjlhIAmx793jt0yjtgmu4Ip1qFQ2ZV7Raac27Sd6z0cd:l080cjcDzDNj3Gd935XvIp1qFhH7RxcU
TLSH T136B1859AFA94CAB0389D81A8A98F70853A06418F4E441D1CF85EF59C7F1475871F87BF
Magika shell
Reporter abuse_ch
Tags:CoinMiner sh
URLMalware sample (SHA256 hash)SignatureTags
http://162.248.53.119:8000/mon.sh1e891ab1521b27923233e694f60fdbf0e1b840e657d8b1ffdefd8b5ef5e38964 CoinMinerCoinMiner
http://ip-api.com/json/n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-09-09T18:34:00Z UTC
Last seen:
2025-09-09T18:34:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.bc
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-PowerShell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-09-09 16:01:13 UTC
File Type:
Text (Shell)
AV detection:
9 of 38 (23.68%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
antivm discovery execution linux persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Checks CPU configuration
Reads CPU attributes
Creates/modifies Cron job
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments