MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7dd1e79bc7035ac1f9476ba3a41424492d768ef3b7be710be3bd44508c3208b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: b7dd1e79bc7035ac1f9476ba3a41424492d768ef3b7be710be3bd44508c3208b
SHA3-384 hash: 80fcdbb1584d126bfcf0b16190406f9b2fcb07ece3934bc6715a4e7ee9b95d2bdbab4fe25ef743f095ee0e5c135728a5
SHA1 hash: 8ae55e7e043e80bde5f4ca2c97936c01603ad79a
MD5 hash: b164e27ead011b07c9836987fe67f3fe
humanhash: hamper-edward-lake-lactose
File name:b7dd1e79bc7035ac1f9476ba3a41424492d768ef3b7be710be3bd44508c3208b.sh
Download: download sample
File size:15'322 bytes
First seen:2026-02-27 14:09:05 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 96:cCuhmB6csht+O+v1fsn+h4+tIiKqCTyOysYtujtuHKNpUj4waHv6Ml6fz7+kxBhh:cCuhK6p4hvZ5m5FG4j4HKNphvIj1
TLSH T12E62573721F14A33A6D054C8A2771BA15F72D60785A720B8F4BE26369F5DE0370EBB21
Magika xml
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://103.30.43.120/loligang.arm7n/an/aelf
http://222.186.52.155:21541/sh/AV.shn/an/abash
http://222.186.52.155:21541/sh/5053.shn/an/an/a
http://116.129.7.63:81/hiddenbin/dvr1.shn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Result
Gathering data
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh b7dd1e79bc7035ac1f9476ba3a41424492d768ef3b7be710be3bd44508c3208b

(this sample)

ce23dcad3dc7c9be8d9c8fc405a267472a3592955fa4005779a04d2642148450

  
Delivery method
Distributed via web download
  
Dropping
MD5 974ea66c02a29e0c960efc1209d6022d
  
Dropping
SHA256 ce23dcad3dc7c9be8d9c8fc405a267472a3592955fa4005779a04d2642148450

Comments