MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 afe347ea9026aec7b4eb18bb09a1cbb5289e59c6b083fe11a49b80eb75b7279b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: afe347ea9026aec7b4eb18bb09a1cbb5289e59c6b083fe11a49b80eb75b7279b
SHA3-384 hash: 208b97f2ea384764a078b8a74aec7a69aba59935f3adefda698c345aef3b0e89352d084a371d55643f4e60fd45ca52be
SHA1 hash: 7a736393f5887fb2f9a5fad414e770a0523e5211
MD5 hash: a9c391a1f8de7abc5e3c4d9d75b8c60c
humanhash: emma-colorado-william-colorado
File name:zyxel
Download: download sample
File size:2'373 bytes
First seen:2025-05-19 10:58:13 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vdD2Ld6T9+dCKCjfdr+Tdk5ydBYldKjgdgVidPCvdV8ddodSdMhedoko5aX:vdD2Ld6T9+d7Ofdr+Tdk5ydBYldKjgdV
TLSH T1EB41D4CA116847FA2CF2D99F71E70848B4F696CA64C16FB0C4E838AF504CC043D89B9A
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://51.38.140.84/main_x86n/an/an/a
http://51.38.140.84/main_mipsn/an/an/a
http://51.38.140.84/main_mpsln/an/an/a
http://51.38.140.84/main_armn/an/an/a
http://51.38.140.84/main_arm5n/an/an/a
http://51.38.140.84/main_arm6n/an/an/a
http://51.38.140.84/main_arm7n/an/an/a
http://51.38.140.84/main_ppcn/an/an/a
http://51.38.140.84/main_m68kn/an/an/a
http://51.38.140.84/main_spcn/an/an/a
http://51.38.140.84/main_i686n/an/an/a
http://51.38.140.84/main_sh4n/an/an/a
http://51.38.140.84/main_arcn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-05-19 10:59:19 UTC
File Type:
Text (Shell)
AV detection:
17 of 24 (70.83%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh afe347ea9026aec7b4eb18bb09a1cbb5289e59c6b083fe11a49b80eb75b7279b

(this sample)

  
Delivery method
Distributed via web download

Comments