MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2e210ebb947069c36ce3d6ba93c5e5a9289fd02589a16ce1d3a35587407cc08. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e2e210ebb947069c36ce3d6ba93c5e5a9289fd02589a16ce1d3a35587407cc08
SHA3-384 hash: 8293dcbfe0aa28abeefea9306dbd13495a0b32e999e86d117954ae95fd2567ab9e696512d9312c6db8044e96a0ead3ca
SHA1 hash: 09e4dd4d9786253ee532a62bf18057c5d1694f66
MD5 hash: 701564a3b413b4b1f54bd1f7cbcb9328
humanhash: november-enemy-zebra-yellow
File name:vps.sh
Download: download sample
File size:2'127 bytes
First seen:2026-03-17 20:10:51 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:7UjO/zSRQquLAkOG6ErnXkrmKCKwoCIN/p/AiQ7nHt0q5KJ0MLRJMu+uy5dA:aOLSR3yAkt/XkTVWNN0fLReCynA
TLSH T1614187E5F5706D3A716ECA28E24E12006EDB2B6304BD249490E7BD902E7E11C93A4F75
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=ebbb57f9-1a00-0000-65ca-6751c60a0000 pid=2758 /usr/bin/sudo guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762 /tmp/sample.bin write-config guuid=ebbb57f9-1a00-0000-65ca-6751c60a0000 pid=2758->guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762 execve guuid=d9d022fc-1a00-0000-65ca-6751cc0a0000 pid=2764 /usr/sbin/userdel guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=d9d022fc-1a00-0000-65ca-6751cc0a0000 pid=2764 execve guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767 /usr/sbin/useradd delete-file write-config write-file guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767 execve guuid=6a6b864a-1b00-0000-65ca-67512c0b0000 pid=2860 /usr/bin/bash guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=6a6b864a-1b00-0000-65ca-67512c0b0000 pid=2860 clone guuid=19938c4a-1b00-0000-65ca-67512d0b0000 pid=2861 /usr/sbin/chpasswd write-config guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=19938c4a-1b00-0000-65ca-67512d0b0000 pid=2861 execve guuid=a27ced7b-1b00-0000-65ca-67517e0b0000 pid=2942 /usr/bin/chmod guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=a27ced7b-1b00-0000-65ca-67517e0b0000 pid=2942 execve guuid=6f76567c-1b00-0000-65ca-6751810b0000 pid=2945 /usr/bin/sed write-config guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=6f76567c-1b00-0000-65ca-6751810b0000 pid=2945 execve guuid=70270d7d-1b00-0000-65ca-6751840b0000 pid=2948 /usr/bin/cat write-config guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=70270d7d-1b00-0000-65ca-6751840b0000 pid=2948 execve guuid=4bdb9e7d-1b00-0000-65ca-6751850b0000 pid=2949 /usr/bin/systemctl guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=4bdb9e7d-1b00-0000-65ca-6751850b0000 pid=2949 execve guuid=ecbdfb89-1b00-0000-65ca-6751a10b0000 pid=2977 /usr/sbin/xtables-nft-multi guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=ecbdfb89-1b00-0000-65ca-6751a10b0000 pid=2977 execve guuid=f1ed1e94-1b00-0000-65ca-6751bc0b0000 pid=3004 /usr/sbin/xtables-nft-multi guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=f1ed1e94-1b00-0000-65ca-6751bc0b0000 pid=3004 execve guuid=36be0b96-1b00-0000-65ca-6751c30b0000 pid=3011 /usr/sbin/xtables-nft-multi guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=36be0b96-1b00-0000-65ca-6751c30b0000 pid=3011 execve guuid=3dee2e98-1b00-0000-65ca-6751ca0b0000 pid=3018 /usr/sbin/xtables-nft-multi guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=3dee2e98-1b00-0000-65ca-6751ca0b0000 pid=3018 execve guuid=4872ab98-1b00-0000-65ca-6751cc0b0000 pid=3020 /usr/sbin/xtables-nft-multi guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=4872ab98-1b00-0000-65ca-6751cc0b0000 pid=3020 execve guuid=84161c99-1b00-0000-65ca-6751cd0b0000 pid=3021 /usr/sbin/xtables-nft-multi guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=84161c99-1b00-0000-65ca-6751cd0b0000 pid=3021 execve guuid=7ebb9199-1b00-0000-65ca-6751cf0b0000 pid=3023 /usr/sbin/xtables-nft-multi guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=7ebb9199-1b00-0000-65ca-6751cf0b0000 pid=3023 execve guuid=41365e9b-1b00-0000-65ca-6751d40b0000 pid=3028 /usr/bin/systemctl guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=41365e9b-1b00-0000-65ca-6751d40b0000 pid=3028 execve guuid=815fc39c-1b00-0000-65ca-6751d90b0000 pid=3033 /usr/bin/systemctl guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=815fc39c-1b00-0000-65ca-6751d90b0000 pid=3033 execve guuid=7d25869e-1b00-0000-65ca-6751de0b0000 pid=3038 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=7d25869e-1b00-0000-65ca-6751de0b0000 pid=3038 execve guuid=7a0b20a1-1b00-0000-65ca-6751e70b0000 pid=3047 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=7a0b20a1-1b00-0000-65ca-6751e70b0000 pid=3047 execve guuid=357f41a4-1b00-0000-65ca-6751ec0b0000 pid=3052 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=357f41a4-1b00-0000-65ca-6751ec0b0000 pid=3052 execve guuid=b5b53fa7-1b00-0000-65ca-6751f50b0000 pid=3061 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=b5b53fa7-1b00-0000-65ca-6751f50b0000 pid=3061 execve guuid=4b8879aa-1b00-0000-65ca-6751000c0000 pid=3072 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=4b8879aa-1b00-0000-65ca-6751000c0000 pid=3072 execve guuid=c4f5faac-1b00-0000-65ca-6751090c0000 pid=3081 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=c4f5faac-1b00-0000-65ca-6751090c0000 pid=3081 execve guuid=8e4191af-1b00-0000-65ca-6751130c0000 pid=3091 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=8e4191af-1b00-0000-65ca-6751130c0000 pid=3091 execve guuid=04c500b3-1b00-0000-65ca-6751200c0000 pid=3104 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=04c500b3-1b00-0000-65ca-6751200c0000 pid=3104 execve guuid=d2e10db6-1b00-0000-65ca-67512a0c0000 pid=3114 /usr/bin/pgrep guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=d2e10db6-1b00-0000-65ca-67512a0c0000 pid=3114 execve guuid=da5b30b9-1b00-0000-65ca-6751320c0000 pid=3122 /usr/bin/ps guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=da5b30b9-1b00-0000-65ca-6751320c0000 pid=3122 execve guuid=d21e3bb9-1b00-0000-65ca-6751330c0000 pid=3123 /usr/bin/mawk guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=d21e3bb9-1b00-0000-65ca-6751330c0000 pid=3123 execve guuid=546446b9-1b00-0000-65ca-6751340c0000 pid=3124 /usr/bin/xargs guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=546446b9-1b00-0000-65ca-6751340c0000 pid=3124 execve guuid=17897ebc-1b00-0000-65ca-67513f0c0000 pid=3135 /usr/bin/rm delete-file guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=17897ebc-1b00-0000-65ca-67513f0c0000 pid=3135 execve guuid=2a42c8c0-1b00-0000-65ca-6751480c0000 pid=3144 /usr/bin/timeout guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=2a42c8c0-1b00-0000-65ca-6751480c0000 pid=3144 execve guuid=769be2c2-1b00-0000-65ca-67514e0c0000 pid=3150 /usr/bin/curl net guuid=c5fd81fb-1a00-0000-65ca-6751ca0a0000 pid=2762->guuid=769be2c2-1b00-0000-65ca-67514e0c0000 pid=3150 execve guuid=cf31b449-1b00-0000-65ca-6751240b0000 pid=2852 /usr/sbin/useradd guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767->guuid=cf31b449-1b00-0000-65ca-6751240b0000 pid=2852 clone guuid=e3dbd149-1b00-0000-65ca-6751250b0000 pid=2853 /usr/sbin/useradd guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767->guuid=e3dbd149-1b00-0000-65ca-6751250b0000 pid=2853 clone guuid=3560eb49-1b00-0000-65ca-6751260b0000 pid=2854 /usr/sbin/useradd guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767->guuid=3560eb49-1b00-0000-65ca-6751260b0000 pid=2854 clone guuid=8892054a-1b00-0000-65ca-6751280b0000 pid=2856 /usr/sbin/useradd guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767->guuid=8892054a-1b00-0000-65ca-6751280b0000 pid=2856 clone guuid=d5681b4a-1b00-0000-65ca-6751290b0000 pid=2857 /usr/sbin/useradd guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767->guuid=d5681b4a-1b00-0000-65ca-6751290b0000 pid=2857 clone guuid=b54e334a-1b00-0000-65ca-67512a0b0000 pid=2858 /usr/sbin/useradd guuid=c4c99ffd-1a00-0000-65ca-6751cf0a0000 pid=2767->guuid=b54e334a-1b00-0000-65ca-67512a0b0000 pid=2858 clone guuid=dab8987b-1b00-0000-65ca-67517b0b0000 pid=2939 /usr/sbin/chpasswd guuid=19938c4a-1b00-0000-65ca-67512d0b0000 pid=2861->guuid=dab8987b-1b00-0000-65ca-67517b0b0000 pid=2939 clone guuid=d1bab67b-1b00-0000-65ca-67517d0b0000 pid=2941 /usr/sbin/chpasswd guuid=19938c4a-1b00-0000-65ca-67512d0b0000 pid=2861->guuid=d1bab67b-1b00-0000-65ca-67517d0b0000 pid=2941 clone guuid=f024fcbb-1b00-0000-65ca-67513c0c0000 pid=3132 /usr/bin/kill guuid=546446b9-1b00-0000-65ca-6751340c0000 pid=3124->guuid=f024fcbb-1b00-0000-65ca-67513c0c0000 pid=3132 execve guuid=18e249c1-1b00-0000-65ca-6751490c0000 pid=3145 /usr/bin/bash guuid=2a42c8c0-1b00-0000-65ca-6751480c0000 pid=3144->guuid=18e249c1-1b00-0000-65ca-6751490c0000 pid=3145 execve guuid=1629c3c1-1b00-0000-65ca-67514b0c0000 pid=3147 /usr/bin/bash net guuid=18e249c1-1b00-0000-65ca-6751490c0000 pid=3145->guuid=1629c3c1-1b00-0000-65ca-67514b0c0000 pid=3147 clone 66dfbe69-23a0-5d8e-98f7-a1501fb7d2a8 176.65.139.15:65511 guuid=1629c3c1-1b00-0000-65ca-67514b0c0000 pid=3147->66dfbe69-23a0-5d8e-98f7-a1501fb7d2a8 con guuid=769be2c2-1b00-0000-65ca-67514e0c0000 pid=3150->66dfbe69-23a0-5d8e-98f7-a1501fb7d2a8 con
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2026-03-17 20:11:39 UTC
File Type:
Text (Shell)
AV detection:
5 of 24 (20.83%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
antivm credential_access defense_evasion discovery execution linux persistence privilege_escalation rootkit
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Creates .desktop file
Reads CPU attributes
Modifies Bash startup script
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Adds a user to the system
Creates/modifies environment variables
Enumerates running processes
Flushes firewall rules
Loads a kernel module
Modifies sudoers policy
OS Credential Dumping
Modifies password files for system users/ groups
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh e2e210ebb947069c36ce3d6ba93c5e5a9289fd02589a16ce1d3a35587407cc08

(this sample)

  
Delivery method
Distributed via web download

Comments