MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7e0737b43b0b58481f1741d0ff13baf7a54a284b7404e19a06812c2f71ee506e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 7e0737b43b0b58481f1741d0ff13baf7a54a284b7404e19a06812c2f71ee506e |
|---|---|
| SHA3-384 hash: | e52063e255d83f76cb679a2c28b0cb63e78ace543d7bf211ac43a999c63252b56a890bda1eccf82cb23f07a63cd3b469 |
| SHA1 hash: | 32359d8e473fb805df726d16d7976d4f33ae6295 |
| MD5 hash: | 64fdbc83009d89801b5fb6b3afeb3c0c |
| humanhash: | ten-east-may-charlie |
| File name: | IWmYEAWtKLoC8naZASgZOKvXkfxklXI6ZPotespqcceEyTFZ6WJY9Hy5xEQGE4O8dBVtG0bu75FEN.aspx |
| Download: | download sample |
| File size: | 678 bytes |
| First seen: | 2026-02-02 14:02:08 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/x-shellscript |
| ssdeep | 12:fXFHY/vGXFhl857524CPjTFHY/vGXFhlvbyhU7Ci//WjFHY/vGXFhl9YORsR0u8b:f1Ge5xT1Ge5Tyy70j1Ge59Y+s+Am |
| TLSH | T16401C0DA8F806AB9524357C37722B8B80F43552F545D4608E9D4CB1101DA7E4C521913 |
| TrID | 70.0% (.SH) Linux/UNIX shell script (7000/1) 30.0% (.) Unix-like shebang (var.3) (gen) (3000/1) |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| https://pjf61vhjf1q49wkxpx8xcjjnswpx0il4ne876vsfzoefyyw.pages.dev/wt5CUOKw7Kv9z5FDDdLVUzT3xxaPRblgLRMCoa4Qqf2Q0CTQd6iz2YO3VXuDiTfvDrZqrgqZLLq7.aspx | n/a | n/a | n/a |
| https://pjf61vhjf1q49wkxpx8xcjjnswpx0il4ne876vsfzoefyyw.pages.dev/PevrMBddKrCWT38a8p76CdqdUTZC0Hv266lwQYOmcS6ZfrN7CjMuPRRIU4njbOJCf47IFR.aspx | n/a | n/a | n/a |
| https://pjf61vhjf1q49wkxpx8xcjjnswpx0il4ne876vsfzoefyyw.pages.dev/hooN0PEceXYaBljGYqsEZc4j7rU9cM5Kn7bRzhV0p5bAUOY9RSi6oum7ujSOcI9jNTCXeQMFl6Y1fX.aspx | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
27
Origin country :
DEVendor Threat Intelligence
Gathering data
Result
Gathering data
Verdict:
Malicious
File Type:
Script
Detections:
HEUR:Trojan-Downloader.OSX.Coins.k
Status:
terminated
Behavior Graph:
Score:
99%
Verdict:
Malware
File Type:
SCRIPT
Verdict:
Malicious
Threat:
Trojan-Downloader.OSX.Coins
Threat name:
MacOS.Downloader.Generic
Status:
Suspicious
First seen:
2026-02-02 14:02:46 UTC
File Type:
Text (Shell)
AV detection:
1 of 36 (2.78%)
Threat level:
3/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
4/10
Tags:
antivm discovery linux
Behaviour
Reads runtime system information
Checks CPU configuration
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 7e0737b43b0b58481f1741d0ff13baf7a54a284b7404e19a06812c2f71ee506e
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.