MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8eb9e769aba2765264b05345252e74acb782904d8b464443a8141334d692b53b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 8eb9e769aba2765264b05345252e74acb782904d8b464443a8141334d692b53b
SHA3-384 hash: 32827ef0bfbf08be9cb85bdf8e36922834ee9aba57c50efc6fa9ce86dc4659828bdfd94b6116b69aa7d6e75a145e8f89
SHA1 hash: af3cad331188573d46daf9353ac19a667d44ec37
MD5 hash: e3cced1828543c59cb516643aefa7aee
humanhash: mountain-bakerloo-carpet-fruit
File name:bins.sh
Download: download sample
File size:10'662 bytes
First seen:2024-11-21 21:00:55 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:mZ5UxxnLvcahh/FtJ7OCw7rPReSm7/M/U/3qWbnTaWKS7VjVnVwJpIMrMPM1TQAI:0Ws4byq3qWBhZVwJpBAk1TQAZZVwJpHR
TLSH T17C22D2DD36A4B0F11254CD9D79B2E40933E900C58DDFAF6CD6C818AD82B4F893E6AE54
Magika shell
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2024-11-21 21:01:04 UTC
File Type:
Text (Shell)
AV detection:
15 of 38 (39.47%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 8eb9e769aba2765264b05345252e74acb782904d8b464443a8141334d692b53b

(this sample)

  
Delivery method
Distributed via web download

Comments