MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b6ff6b9d356fcfa872cc9d944c14294c65c416299c6451520753544f5f51a2dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | b6ff6b9d356fcfa872cc9d944c14294c65c416299c6451520753544f5f51a2dd |
|---|---|
| SHA3-384 hash: | efdf60275624e1f9181d641a371d867e3c0db58cbe74ee5fce0d28c9a78b16ea6ad49347b4c107d06d64d9dabd92ee38 |
| SHA1 hash: | 712299a6213aa54e4fecc195bf378e44384d6483 |
| MD5 hash: | 6fe2a2390b05276ef1dd4b7c39a4c54b |
| humanhash: | mango-mike-ink-emma |
| File name: | c.sh |
| Download: | download sample |
| File size: | 394 bytes |
| First seen: | 2026-02-07 12:56:05 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 12:3J3UWJQjxUW4qxUWFf0LKjxUW4CxUW4xUW4fAARn:3J3DJQh4yUKh4KAmdRn |
| TLSH | T130E07DDA66E6759BDB3CAE48F46E82486441E3C870B2CE60E015587698DB10AB054FA7 |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://158.94.210.68/arm | e478194e705ddb9c71827a6e96a6033cd725f9d3290abdc42f8129ec7eb7dab1 | Mirai | elf mirai ua-wget |
| http://158.94.210.68/arm5 | 26a8ffffa35bdf8e1026097d452d0306bbc89178d154946baded5f24cde859be | Mirai | elf mirai ua-wget |
| http://158.94.210.68/arm7 | 65ebfddf4f9fd4576715d78e13721223a6286ea8e75b8c122143d1734b03ebc4 | Mirai | elf mirai ua-wget |
| http://158.94.210.68/mips | 1fb32d9130b8d5c7919259e77f454ec6fecc2d3569a569672460c71ec166412e | Mirai | elf gafgyt mirai ua-wget |
| http://158.94.210.68/mipsel | 567fa40676b9708ff104a36d4c03af79fcd359b1ae24bcf2a92530e9ef13d849 | Mirai | elf gafgyt mirai ua-wget |
| http://158.94.210.68/x86_64 | e1070a1fc2fb87915180f0aae2b9632579758e15cc333e79500d9bf289bc645b | Mirai | elf gafgyt mirai ua-wget |
Intelligence
File Origin
# of uploads :
1
# of downloads :
26
Origin country :
DEVendor Threat Intelligence
No detections
Detection(s):
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
mirai
Result
Gathering data
Status:
Failed
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Document-HTML.Worm.Mirai
Status:
Malicious
First seen:
2026-02-07 12:51:23 UTC
File Type:
Text (Shell)
AV detection:
8 of 36 (22.22%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh b6ff6b9d356fcfa872cc9d944c14294c65c416299c6451520753544f5f51a2dd
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.