MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d17c10cf0975ffbc60f7d6a0b6446524e1608be0aa1fbd2ea0cc39d8388fc9bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: d17c10cf0975ffbc60f7d6a0b6446524e1608be0aa1fbd2ea0cc39d8388fc9bd
SHA3-384 hash: 8e3452b281addce1e40b74ec3b62f26086da1e1ea790e97d6838473f6f72594d1c4afc44c6df56d997a53d94410936e3
SHA1 hash: 93bfdb18f722c3a7fd4bb99de3f5eb8323ce8f76
MD5 hash: f05ff851c16a9aafe2e0b48b5a0e3fd9
humanhash: fourteen-gee-social-foxtrot
File name:lol.sh
Download: download sample
File size:244 bytes
First seen:2026-04-02 11:58:52 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 3:TKH4vLYzVDNqd47LHE0uT9ZVmtnvbMFsMLONFoEudF/F0TDNcM9pBEvNTOSNmO9/:hT4Vz7Lk75l6NXordM+MhkT7mOCyd
TLSH T1EDD0A78EA953216710658C1EF2B39415A708925E9C5566143F4D403B5BB0A0471D9984
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter BlinkzSec

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
CZ CZ
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-04-02T09:05:00Z UTC
Last seen:
2026-04-04T01:44:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.Shell.Agent.bi
Status:
terminated
Behavior Graph:
%3 guuid=ef11680c-1900-0000-b3b3-a5be32080000 pid=2098 /usr/bin/sudo guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104 /tmp/sample.bin guuid=ef11680c-1900-0000-b3b3-a5be32080000 pid=2098->guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104 execve guuid=45ff090f-1900-0000-b3b3-a5be39080000 pid=2105 /usr/bin/rm guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=45ff090f-1900-0000-b3b3-a5be39080000 pid=2105 execve guuid=1d6c770f-1900-0000-b3b3-a5be3b080000 pid=2107 /usr/bin/wget net send-data write-file guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=1d6c770f-1900-0000-b3b3-a5be3b080000 pid=2107 execve guuid=b4499b14-1900-0000-b3b3-a5be41080000 pid=2113 /usr/bin/chmod guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=b4499b14-1900-0000-b3b3-a5be41080000 pid=2113 execve guuid=37d8ef14-1900-0000-b3b3-a5be42080000 pid=2114 /usr/bin/dash guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=37d8ef14-1900-0000-b3b3-a5be42080000 pid=2114 clone guuid=72727716-1900-0000-b3b3-a5be46080000 pid=2118 /usr/bin/rm guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=72727716-1900-0000-b3b3-a5be46080000 pid=2118 execve guuid=2211d916-1900-0000-b3b3-a5be48080000 pid=2120 /usr/bin/wget net send-data write-file guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=2211d916-1900-0000-b3b3-a5be48080000 pid=2120 execve guuid=796d9f1b-1900-0000-b3b3-a5be50080000 pid=2128 /usr/bin/chmod guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=796d9f1b-1900-0000-b3b3-a5be50080000 pid=2128 execve guuid=21eee61b-1900-0000-b3b3-a5be51080000 pid=2129 /usr/bin/dash guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=21eee61b-1900-0000-b3b3-a5be51080000 pid=2129 clone guuid=8d1ecf1d-1900-0000-b3b3-a5be56080000 pid=2134 /usr/bin/rm guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=8d1ecf1d-1900-0000-b3b3-a5be56080000 pid=2134 execve guuid=85573b1e-1900-0000-b3b3-a5be58080000 pid=2136 /usr/bin/wget net send-data write-file guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=85573b1e-1900-0000-b3b3-a5be58080000 pid=2136 execve guuid=b6e07b23-1900-0000-b3b3-a5be64080000 pid=2148 /usr/bin/chmod guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=b6e07b23-1900-0000-b3b3-a5be64080000 pid=2148 execve guuid=f45fe623-1900-0000-b3b3-a5be65080000 pid=2149 /usr/bin/dash guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=f45fe623-1900-0000-b3b3-a5be65080000 pid=2149 clone guuid=34618226-1900-0000-b3b3-a5be6c080000 pid=2156 /usr/bin/rm guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=34618226-1900-0000-b3b3-a5be6c080000 pid=2156 execve guuid=dd48f326-1900-0000-b3b3-a5be6e080000 pid=2158 /usr/bin/wget net send-data write-file guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=dd48f326-1900-0000-b3b3-a5be6e080000 pid=2158 execve guuid=6b9a6c2b-1900-0000-b3b3-a5be7b080000 pid=2171 /usr/bin/chmod guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=6b9a6c2b-1900-0000-b3b3-a5be7b080000 pid=2171 execve guuid=5084bd2b-1900-0000-b3b3-a5be7d080000 pid=2173 /usr/bin/dash guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=5084bd2b-1900-0000-b3b3-a5be7d080000 pid=2173 clone guuid=67c58f2c-1900-0000-b3b3-a5be81080000 pid=2177 /usr/bin/rm delete-file guuid=4bf1c40e-1900-0000-b3b3-a5be38080000 pid=2104->guuid=67c58f2c-1900-0000-b3b3-a5be81080000 pid=2177 execve a7a12ae4-26b4-5170-a6af-e6169ae8eca9 87.121.84.18:80 guuid=1d6c770f-1900-0000-b3b3-a5be3b080000 pid=2107->a7a12ae4-26b4-5170-a6af-e6169ae8eca9 send: 141B guuid=2211d916-1900-0000-b3b3-a5be48080000 pid=2120->a7a12ae4-26b4-5170-a6af-e6169ae8eca9 send: 142B guuid=85573b1e-1900-0000-b3b3-a5be58080000 pid=2136->a7a12ae4-26b4-5170-a6af-e6169ae8eca9 send: 142B guuid=dd48f326-1900-0000-b3b3-a5be6e080000 pid=2158->a7a12ae4-26b4-5170-a6af-e6169ae8eca9 send: 142B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.MiraiB
Status:
Malicious
First seen:
2026-04-02 11:53:28 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux
Behaviour
Changes its process name
Reads system network configuration
Enumerates active TCP sockets
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh d17c10cf0975ffbc60f7d6a0b6446524e1608be0aa1fbd2ea0cc39d8388fc9bd

(this sample)

  
Delivery method
Distributed via web download

Comments