MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8132205baadda305b066dc5edb944c4f6c14ddfb87ebfe6beb8869cb37bef98c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 8132205baadda305b066dc5edb944c4f6c14ddfb87ebfe6beb8869cb37bef98c |
|---|---|
| SHA3-384 hash: | f61a931d659424ce0a77ceaa6c39eab91c2eb787b9016317906b211a986438a7a06779f43244f7a433f8747f17f4836d |
| SHA1 hash: | 18c67d75733da201f4846ad60ed3fe41862d6c09 |
| MD5 hash: | e3da52a46cabc5e51dde73d68d3b1a20 |
| humanhash: | bluebird-blue-oregon-eleven |
| File name: | cn |
| Download: | download sample |
| File size: | 552 bytes |
| First seen: | 2025-02-24 08:47:22 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 6:LwWgr1wCbTpwbYCDwWgr1cKA1wyXICDwWgr1D22MwZi/DwWgr1UMwZJDwWgr1iNQ:oTKLIhXH8pfNIbtvLYI |
| TLSH | T1DAF0A4CC55233952089CFDAF71B7169D7512C7CC808F4BCE6E81103D845CA50F059B98 |
| Magika | txt |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://193.143.1.116/mips | n/a | n/a | n/a |
| http://193.143.1.116/mpsl | n/a | n/a | n/a |
| http://193.143.1.116/arm | n/a | n/a | n/a |
| http://193.143.1.116/arm5 | n/a | n/a | n/a |
| http://193.143.1.116/arm6 | n/a | n/a | n/a |
| http://193.143.1.116/arm7 | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
23
Origin country :
Vendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
99.9%
Link:
Tags:
mirai agent virus shell
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Verdict:
Malicious
Labled as:
Downloader/Shell.Generic
Result
Verdict:
UNKNOWN
Score:
0%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-24 10:09:16 UTC
File Type:
Text (Shell)
AV detection:
15 of 24 (62.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 8132205baadda305b066dc5edb944c4f6c14ddfb87ebfe6beb8869cb37bef98c
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.