MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7cd75aa45345e33b64e85a4c69a409b13724a190a5321ff280b3203303e9af25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 7cd75aa45345e33b64e85a4c69a409b13724a190a5321ff280b3203303e9af25 |
|---|---|
| SHA3-384 hash: | 8a0225d38ba9d14f6fdaac9dfb5676886ec677fd82f4f32162d1b31a4d35abecb8b64787f16c33db80f03799e6c9f056 |
| SHA1 hash: | cff009d4e9e9bf04d4aa5d8be5d872365a90154c |
| MD5 hash: | 4f8e3051457bcc41c6d0431084b0caca |
| humanhash: | nine-violet-hamper-equal |
| File name: | AtQKnWvZdtF4cnQVkCt85c11CQlXQQ5sDJeot9j0Wo7WVzkj0fq0XDa0d4rmCuYh1GKX.aspx |
| Download: | download sample |
| File size: | 584 bytes |
| First seen: | 2026-02-02 14:02:10 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/x-shellscript |
| ssdeep | 12:UMvlpzsnZc5Sv7oFHY/vGXFhl7RVQiFbCFHY/vGXFhlDG+0Wm:U8my5Sjo1Ge57rVC1Ge5DfRm |
| TLSH | T124F0E1E5CBC09D757547879C36D1F46E8B4328AF6A0C4800B6958F2001DD6E0D7B9F13 |
| TrID | 70.0% (.SH) Linux/UNIX shell script (7000/1) 30.0% (.) Unix-like shebang (var.3) (gen) (3000/1) |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| https://pjf61vhjf1q49wkxpx8xcjjnswpx0il4ne876vsfzoefyyw.pages.dev/IWmYEAWtKLoC8naZASgZOKvXkfxklXI6ZPotespqcceEyTFZ6WJY9Hy5xEQGE4O8dBVtG0bu75FEN.aspx | n/a | n/a | DigitStealer macOS |
| https://pjf61vhjf1q49wkxpx8xcjjnswpx0il4ne876vsfzoefyyw.pages.dev/f766dkmSlcN6k10D9usVKwHUiQk2luOAT1wapFpVEpkPadbRyxZtP0aYkSw465iC6Sm.aspx | n/a | n/a | DigitStealer macOS |
Intelligence
File Origin
# of uploads :
1
# of downloads :
29
Origin country :
DEVendor Threat Intelligence
Gathering data
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
bash lolbin masquerade
Result
Gathering data
Verdict:
Malicious
File Type:
Script
Detections:
HEUR:Trojan-Downloader.Shell.Agent.ds HEUR:Trojan-Downloader.OSX.Coins.k
Status:
terminated
Behavior Graph:
Score:
74%
Verdict:
Malware
File Type:
SCRIPT
Verdict:
Malicious
Threat:
Trojan-Downloader.OSX.Coins
Threat name:
MacOS.Downloader.Generic
Status:
Suspicious
First seen:
2026-02-02 14:03:45 UTC
File Type:
Text (Shell)
AV detection:
1 of 36 (2.78%)
Threat level:
3/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
4/10
Tags:
antivm discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 7cd75aa45345e33b64e85a4c69a409b13724a190a5321ff280b3203303e9af25
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.