MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c287bc8d3565017f3fe8aa740a00297f664b52504df224a16494fd692d84b45c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c287bc8d3565017f3fe8aa740a00297f664b52504df224a16494fd692d84b45c
SHA3-384 hash: 64804d06f5f6486aede95ba7ab8d435cc8ae1566e0c11c9419464c59f30de1ae6700bc9d760d656f6404414bd535dff7
SHA1 hash: ae55ef3933701a2732f3a67ea8f9ae17a65999da
MD5 hash: c0c70ac9bffd19edbcb01459e0702ca6
humanhash: harry-golf-beryllium-charlie
File name:jaws
Download: download sample
File size:2'360 bytes
First seen:2025-05-19 10:58:15 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vdD2od6T9TdCKCj8dr+wdk5ndBY2dKjBdgVXdPCMdV8OdodHdMhzdoko5ai:vdD2od6T9Td7O8dr+wdk5ndBY2dKjBdz
TLSH T11D41AACA015807BA2CF2D59F31E70488B4F596CA64C16FB4D4E478EA604DD443D88B5A
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://51.38.140.84/main_x86n/an/an/a
http://51.38.140.84/main_mipsn/an/an/a
http://51.38.140.84/main_mpsln/an/an/a
http://51.38.140.84/main_armn/an/an/a
http://51.38.140.84/main_arm5n/an/an/a
http://51.38.140.84/main_arm6n/an/an/a
http://51.38.140.84/main_arm7n/an/an/a
http://51.38.140.84/main_ppcn/an/an/a
http://51.38.140.84/main_m68kn/an/an/a
http://51.38.140.84/main_spcn/an/an/a
http://51.38.140.84/main_i686n/an/an/a
http://51.38.140.84/main_sh4n/an/an/a
http://51.38.140.84/main_arcn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
DE DE
Vendor Threat Intelligence
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-05-19 10:59:20 UTC
File Type:
Text (Shell)
AV detection:
17 of 24 (70.83%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh c287bc8d3565017f3fe8aa740a00297f664b52504df224a16494fd692d84b45c

(this sample)

  
Delivery method
Distributed via web download

Comments