MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cf750295a75685e3d5aeca0baebd9ee3d73d3e8b8af0d499e2d2d1e84fb78af6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | cf750295a75685e3d5aeca0baebd9ee3d73d3e8b8af0d499e2d2d1e84fb78af6 |
|---|---|
| SHA3-384 hash: | 47788dc0f65e74b2dfdbedf2fcadd0c2792ae3d2e1fe4fb3471af92561a5d1f2568366e67a2ac3199f21a4ecd1e7a7d6 |
| SHA1 hash: | 259098317aedea12b1645d565d9484889ae7f12f |
| MD5 hash: | 466eda03f3f07e52a2a170ad22460904 |
| humanhash: | robert-steak-item-mississippi |
| File name: | zxc.sh |
| Download: | download sample |
| File size: | 579 bytes |
| First seen: | 2025-02-24 08:57:26 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 6:LwWgr17k2mw2ezgwWgr1RjvwT+iwWgr1wHg0Mw1twWgr1+aLU+6w1tyLwWgr18FB:Gj2eFkT+c7aLBHTyMNITt9FTWknN |
| TLSH | T111F081AD003AEF03C84CAEA6346671B7B632C5D8808F8AC9AFC5207C944CA21B121E95 |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://193.143.1.116/splmips | n/a | n/a | n/a |
| http://193.143.1.116/splmpsl | n/a | n/a | n/a |
| http://193.143.1.116/splarm | n/a | n/a | n/a |
| http://193.143.1.116/splarm5 | n/a | n/a | n/a |
| http://193.143.1.116/splarm6 | n/a | n/a | n/a |
| http://193.143.1.116/splarm7 | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
26
Origin country :
Vendor Threat Intelligence
Detection(s):
Verdict:
Clean
Score:
89.1%
Link:
Tags:
n/a
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
evasive
Result
Verdict:
UNKNOWN
Score:
0%
Verdict:
Benign
File Type:
SCRIPT
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-02-24 08:58:11 UTC
File Type:
Text (Shell)
AV detection:
14 of 23 (60.87%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh cf750295a75685e3d5aeca0baebd9ee3d73d3e8b8af0d499e2d2d1e84fb78af6
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.