MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b34241006b130412756e834250f2f73da11f895183040618e030b50b5951da9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AMOS


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: b34241006b130412756e834250f2f73da11f895183040618e030b50b5951da9a
SHA3-384 hash: 0f1cb451ec5026fd1fef22ce1b75633f74f66a8ef374be415c399a046fcf6fcbb7a4bfec2b06ea90d3baecd97ca623f4
SHA1 hash: 4be451826ff82123cfcef0cad87903bdf1ae0bbb
MD5 hash: 6a24e208c3bf580408cf34b12531a5fe
humanhash: thirteen-potato-zulu-chicken
File name:hbjo8tc0uv.sh
Download: download sample
Signature AMOS
File size:162 bytes
First seen:2025-10-27 13:55:46 UTC
Last seen:2025-10-28 05:48:14 UTC
File type: sh
MIME type:text/plain
ssdeep 3:WFBIx8sv3uy9Fb+dNMft9FXOAzLeeymHgmQmk0QQHFxaFOd6HhC:/9vrbsMfbFLebpZnoxa0
TLSH T178C08CC2863CD471523D0E4EF290E0F4AE4658240BB078A1D805CA8020244B80C0F73C
Magika shell
Reporter abuse_ch
Tags:AMOS sh
URLMalware sample (SHA256 hash)SignatureTags
https://715.relocatejacket.com/apps.binn/an/an/a

Intelligence


File Origin
# of uploads :
2
# of downloads :
141
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=ba39a991-1600-0000-36f7-65c1660c0000 pid=3174 /usr/bin/sudo guuid=a38e2293-1600-0000-36f7-65c16d0c0000 pid=3181 /tmp/sample.bin guuid=ba39a991-1600-0000-36f7-65c1660c0000 pid=3174->guuid=a38e2293-1600-0000-36f7-65c16d0c0000 pid=3181 execve guuid=d8855693-1600-0000-36f7-65c16e0c0000 pid=3182 /usr/bin/dash guuid=a38e2293-1600-0000-36f7-65c16d0c0000 pid=3181->guuid=d8855693-1600-0000-36f7-65c16e0c0000 pid=3182 execve guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3184 /usr/bin/curl net send-data guuid=d8855693-1600-0000-36f7-65c16e0c0000 pid=3182->guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3184 execve guuid=6fe985a6-1600-0000-36f7-65c1840c0000 pid=3204 /usr/bin/chmod guuid=d8855693-1600-0000-36f7-65c16e0c0000 pid=3182->guuid=6fe985a6-1600-0000-36f7-65c1840c0000 pid=3204 execve 6db2c41d-f6de-539c-9232-e914037cb1f1 715.relocatejacket.com:443 guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3184->6db2c41d-f6de-539c-9232-e914037cb1f1 send: 789B guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3193 /usr/bin/curl dns net send-data guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3184->guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3193 clone guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3193->6db2c41d-f6de-539c-9232-e914037cb1f1 con 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=5c377e93-1600-0000-36f7-65c1700c0000 pid=3193->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 80B
Threat name:
Linux.Downloader.Amos
Status:
Malicious
First seen:
2025-10-27 13:56:37 UTC
File Type:
Text (Shell)
AV detection:
7 of 38 (18.42%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AMOS

sh b34241006b130412756e834250f2f73da11f895183040618e030b50b5951da9a

(this sample)

Comments