MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 eee4d989fb5035bebca57a6197b8697fe45383cd56a2e105595bc48dae24efc7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | eee4d989fb5035bebca57a6197b8697fe45383cd56a2e105595bc48dae24efc7 |
|---|---|
| SHA3-384 hash: | d8e2d76e69c6fa2e2cd400ec4219244d61cd2529c34e2b43e502279c31f477155c6186c1fefe4af5ed4b38876079513b |
| SHA1 hash: | 24327770bdd493fa7d999bd0c54eb922347db84e |
| MD5 hash: | bec3f566795ff4e9ac1b29589a451c7e |
| humanhash: | lion-eight-utah-utah |
| File name: | w.sh |
| Download: | download sample |
| File size: | 510 bytes |
| First seen: | 2025-05-02 14:32:05 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 12:YVQjw8qwoNIl5zAwZf0LKjw8CwkwEiAUn:j1INI7vqKbm2n |
| TLSH | T100F0BECD615023B60C8CDF18B12E8A099446EBC0E0A41BDC698D15F2BFACE10F395F1A |
| Magika | txt |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://179.43.175.148/arm | 15efe160febc44d6ec2bdd2d94f38c808727328a0ebc8fdca9d9bb67270b90f5 | Mirai | elf mirai |
| http://179.43.175.148/arm5 | n/a | n/a | elf mirai |
| http://179.43.175.148/arm6 | 51b9c3cf30ac64ab2a1be099ce171edd0d5ade83296f3bf61dd070796ee04086 | Mirai | elf mirai |
| http://179.43.175.148/arm7 | 3909213ef52d9589f6328bde418b65647e83c821a74f6a15e08489cf2b5d32b1 | Mirai | elf mirai |
| http://179.43.175.148/mips | n/a | n/a | elf mirai |
| http://179.43.175.148/mipsel | n/a | n/a | elf mirai |
| http://179.43.175.148/x86 | n/a | n/a | elf ua-wget |
Intelligence
File Origin
# of uploads :
1
# of downloads :
62
Origin country :
DEVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
99.9%
Link:
Tags:
trojan mirai virus hype
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-05-02 14:15:10 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh eee4d989fb5035bebca57a6197b8697fe45383cd56a2e105595bc48dae24efc7
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.