MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7966153b950dbeb7103bd7b3c420f429ef499c253427ed1feec0b3d92f23bb37. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 7966153b950dbeb7103bd7b3c420f429ef499c253427ed1feec0b3d92f23bb37
SHA3-384 hash: f32e9fc4912504442499bc781654c69870bed07948e004468776dd5e3ba01d65045ddd40ebb4f44812ed7a4764c606c5
SHA1 hash: d8a4dfd0f470dd57f087e2700a9438999d98bfb7
MD5 hash: a000d211308927423a438677e62902e2
humanhash: nuts-lamp-zebra-shade
File name:payload_direct.txt
Download: download sample
File size:777 bytes
First seen:2026-01-11 06:38:41 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:hAoEMCoagj3sgHXzIdEOa0CQPnF2TY6tWzgQTUUDZ9YKEIz9dhRNTUYAW:KoEe1cgHXxOaoPnF200apbhR6YX
TLSH T1BE01BDEF76108C17B1CC4D2CA09C60C17FC2DF4DA5D9EB5950E3C9A510EE54AF197AA8
Magika txt
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
masquerade
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=39be1fd6-1a00-0000-e7a0-291c360b0000 pid=2870 /usr/bin/sudo guuid=23d186d9-1a00-0000-e7a0-291c440b0000 pid=2884 /tmp/sample.bin write-file guuid=39be1fd6-1a00-0000-e7a0-291c360b0000 pid=2870->guuid=23d186d9-1a00-0000-e7a0-291c440b0000 pid=2884 execve guuid=3ac2c7d9-1a00-0000-e7a0-291c460b0000 pid=2886 /usr/bin/dash guuid=23d186d9-1a00-0000-e7a0-291c440b0000 pid=2884->guuid=3ac2c7d9-1a00-0000-e7a0-291c460b0000 pid=2886 clone guuid=be0a53da-1a00-0000-e7a0-291c490b0000 pid=2889 /usr/bin/pgrep guuid=23d186d9-1a00-0000-e7a0-291c440b0000 pid=2884->guuid=be0a53da-1a00-0000-e7a0-291c490b0000 pid=2889 execve guuid=db57d3df-1a00-0000-e7a0-291c5b0b0000 pid=2907 /usr/bin/dash zombie guuid=23d186d9-1a00-0000-e7a0-291c440b0000 pid=2884->guuid=db57d3df-1a00-0000-e7a0-291c5b0b0000 pid=2907 clone guuid=980bcfd9-1a00-0000-e7a0-291c470b0000 pid=2887 /usr/bin/uname guuid=3ac2c7d9-1a00-0000-e7a0-291c460b0000 pid=2886->guuid=980bcfd9-1a00-0000-e7a0-291c470b0000 pid=2887 execve guuid=87a3e4df-1a00-0000-e7a0-291c5c0b0000 pid=2908 /usr/bin/wget dns net send-data guuid=db57d3df-1a00-0000-e7a0-291c5b0b0000 pid=2907->guuid=87a3e4df-1a00-0000-e7a0-291c5c0b0000 pid=2908 execve 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=87a3e4df-1a00-0000-e7a0-291c5c0b0000 pid=2908->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 172B
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 7966153b950dbeb7103bd7b3c420f429ef499c253427ed1feec0b3d92f23bb37

(this sample)

  
Delivery method
Distributed via web download

Comments