MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ef64ef4e2eb824bb11a54676445cb4379e02524ee7cb4a1f5428d90d4ecb3441. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: ef64ef4e2eb824bb11a54676445cb4379e02524ee7cb4a1f5428d90d4ecb3441
SHA3-384 hash: 5f58b742bd5722f2c98e2abb75ee9963333493dea992c0d966d9bc8519981b4bb63ac434b9495573ab9d059a5658e6a4
SHA1 hash: b2637a83d36be435a8476dfd550d883056399f3c
MD5 hash: 25eb15b9f485d37622a776fd3ef8351f
humanhash: cat-carbon-wolfram-hamper
File name:gpon.sh
Download: download sample
File size:430 bytes
First seen:2026-02-01 07:32:44 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:xLSec+ynT7fnPTaUUbuOTOY6/s9IB2/TzfXFDKoGBoz+d/77Z0/WL4v6KPI1H:9cpn2UUbu85Gs982vZGR7y/6KPC
TLSH T1D3E02BD5108744E990E41DAB27266008EDC7590DCF011EE87C9D38976BA4A28D1EA195
Magika shell
Reporter abuse_ch
Tags:sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Verdict:
Malicious
File Type:
ps1
First seen:
2026-02-01T04:57:00Z UTC
Last seen:
2026-02-01T06:50:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=22a64c54-1900-0000-0605-627c2d080000 pid=2093 /usr/bin/sudo guuid=a7561556-1900-0000-0605-627c32080000 pid=2098 /tmp/sample.bin guuid=22a64c54-1900-0000-0605-627c2d080000 pid=2093->guuid=a7561556-1900-0000-0605-627c32080000 pid=2098 execve guuid=36748256-1900-0000-0605-627c33080000 pid=2099 /usr/bin/rm guuid=a7561556-1900-0000-0605-627c32080000 pid=2098->guuid=36748256-1900-0000-0605-627c33080000 pid=2099 execve
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Browser.MiraiB
Status:
Malicious
First seen:
2026-02-01 07:17:41 UTC
File Type:
Text (Shell)
AV detection:
4 of 36 (11.11%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh ef64ef4e2eb824bb11a54676445cb4379e02524ee7cb4a1f5428d90d4ecb3441

(this sample)

  
Delivery method
Distributed via web download

Comments