MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e0478c41f0db6ca3ebfab4395a3cbacf7916dfc17b3ef8bf4a1cd3bac87dfc60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | e0478c41f0db6ca3ebfab4395a3cbacf7916dfc17b3ef8bf4a1cd3bac87dfc60 |
|---|---|
| SHA3-384 hash: | a6e4eef4732a380726ece32f1b142d7289ec582cfeff616c0a3fe32e6f7a6659dede902e546464bba89897fb2912719a |
| SHA1 hash: | d9cfe8977934c7cf762eb5683010d2a3284b09f0 |
| MD5 hash: | 69762b148c5bd84c6acad2333d6638ad |
| humanhash: | missouri-mobile-kitten-black |
| File name: | c.sh |
| Download: | download sample |
| File size: | 1'140 bytes |
| First seen: | 2025-09-04 09:05:58 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 24:3J3UdIdvHdIdidIdxNIOdIdAKcdIdbdIdgdIdLTDkUdIdotdIdTkdId1dId95dIk:WnmDg |
| TLSH | T14A215BFE33BD9582AB290A8870765018A1C6C2D377A89781F33C54216D9D2CD6E25B37 |
| Magika | txt |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://41.216.189.108/00101010101001/sora.arm | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.arm5 | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.arm6 | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.arm7 | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.m68k | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.mips | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.mpsl | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.ppc | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.sh4 | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.spc | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.x86 | n/a | n/a | elf ua-wget |
| http://41.216.189.108/00101010101001/sora.x86_64 | n/a | n/a | elf ua-wget |
Intelligence
File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Verdict:
Malicious
File Type:
ps1
First seen:
2025-09-04T06:42:00Z UTC
Last seen:
2025-09-04T06:42:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Verdict:
Malicious
Threat:
Family.MIRAI
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-09-04 08:59:22 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh e0478c41f0db6ca3ebfab4395a3cbacf7916dfc17b3ef8bf4a1cd3bac87dfc60
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.