MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 879c173d847e567c724fcd315981c261dd74b405a05656742529db3be506b0b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 879c173d847e567c724fcd315981c261dd74b405a05656742529db3be506b0b4 |
|---|---|
| SHA3-384 hash: | 26cee4d21f0759279469694d9d859fc8d5b06c40812d82ec0745b095a4f384a8742603b9e49ca6bff23e900301790b2b |
| SHA1 hash: | 42a576905cd24f3c448339f97e9e2db65d8eaf0b |
| MD5 hash: | a1fb7f97b176943db9d904db42fbfa2e |
| humanhash: | triple-robert-social-asparagus |
| File name: | wop |
| Download: | download sample |
| File size: | 578 bytes |
| First seen: | 2025-02-24 08:52:27 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 6:LwWgr17k2mw2ezgwWgr1RjvwT+iwWgr1wHg0Mw1twWgr1+aLU+6w1tyLwWgr18Fo:Gj2eFkT+c7aLBHTyMNITt9FTWB |
| TLSH | T127F031AD003AEF13C85CAEA6356671B7B632C5D8908F8BC9AFC5207C944CA21A165E95 |
| Magika | txt |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://193.143.1.116/splmips | n/a | n/a | n/a |
| http://193.143.1.116/splmpsl | n/a | n/a | n/a |
| http://193.143.1.116/splarm | n/a | n/a | n/a |
| http://193.143.1.116/splarm5 | n/a | n/a | n/a |
| http://193.143.1.116/splarm6 | n/a | n/a | n/a |
| http://193.143.1.116/splarm7 | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
23
Origin country :
Vendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
93.3%
Link:
Tags:
agent hype sage
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Verdict:
Malicious
Labled as:
Downloader/Shell.Generic
Result
Verdict:
UNKNOWN
Score:
0%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-02-24 10:09:17 UTC
File Type:
Text (Shell)
AV detection:
13 of 38 (34.21%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh 879c173d847e567c724fcd315981c261dd74b405a05656742529db3be506b0b4
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.