MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7bcb2c4036d3551fe13477c1739e5c5d0a0e916cc2bcab8fd184a90f72b41e06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 7bcb2c4036d3551fe13477c1739e5c5d0a0e916cc2bcab8fd184a90f72b41e06
SHA3-384 hash: 2087b2ba7229b04cb7ccddfcc453d21f40611f645ef628b98d31ef103cbd94709caa730db13f3a88b695b5c07ca19598
SHA1 hash: 3423f47508f1ffbf8a7bfbfa33e02de18f9e5aa2
MD5 hash: c7b3ac99f39df67b63f0b3b2d05e3bd5
humanhash: kitten-mobile-oklahoma-crazy
File name:dvr.sh
Download: download sample
File size:667 bytes
First seen:2025-12-07 07:16:45 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:t9A+ZDa3HWLpaaHWLJzvaJzMHWLvIjDavIMHWLaDarHWq:t91ZkWNW9zSzGWznhWGwWq
TLSH T11F0144FF445905591480B90EF9670824B0376BEBA4EDCF8E5D4E3E36278DA68B421F64
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.115/mips67df849f3252e566ca8f73336ab31eb7b5ddb277c91f90a9dac885c9d9de3837 Mirai32-bit elf mirai Mozi
http://213.209.143.115/mpsl449e30caaa96c2833e4f381071095addc874ad4bab41e21225acf6356145c0ed Miraielf mirai ua-wget
http://213.209.143.115/arm4a3d5e3c3e422d72ef0e095e164f2706e250839eaf52e24dd7624f6e3e250f8da Miraielf mirai ua-wget
http://213.209.143.115/arm5788e47fcc1f7e85da5b575ddeb98980fafc9cab532c378855556d679da2a59be Miraielf mirai ua-wget
http://213.209.143.115/arm7547d1e75421bbbfe0492e2191417ad070d3e1e40db837e9aa4737c7946cd67b7 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
29
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive expand lolbin mirai
Result
Gathering data
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-12-07 07:08:34 UTC
File Type:
Text (Shell)
AV detection:
11 of 36 (30.56%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 7bcb2c4036d3551fe13477c1739e5c5d0a0e916cc2bcab8fd184a90f72b41e06

(this sample)

  
Delivery method
Distributed via web download

Comments