MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f5eccdd0753e63302d0015449a211a825fc1ee0b0dddcdd4f7a6746ceb8d9e84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | f5eccdd0753e63302d0015449a211a825fc1ee0b0dddcdd4f7a6746ceb8d9e84 |
|---|---|
| SHA3-384 hash: | 12a0088c4e04c0fb82d96340c3ffc66a0a2ccd70395ab8c84454507b751f7b2bfd9831b35cad6912cf13aa95410edd42 |
| SHA1 hash: | 4598435e466c05de8d5317255504ba18df7e9bc9 |
| MD5 hash: | bf824b309779306d1987419fabe6eb7c |
| humanhash: | burger-hotel-potato-double |
| File name: | massload |
| Download: | download sample |
| File size: | 2'045 bytes |
| First seen: | 2025-04-18 11:43:34 UTC |
| Last seen: | Never |
| File type: | sh |
| MIME type: | text/plain |
| ssdeep | 24:GIbTAHWaHwJGLpGxmcvtrHWjHw6H8pGxZ37csJRtoHGx5J3hsebucxj:jTEWKwIAWbwIwETR1 |
| TLSH | T10341DED9D772FF26E507AF543101C701B88B9EB327824921DA9924F3C89ED243467A6F |
| Magika | shell |
| Reporter | |
| Tags: | sh |
Shell script dropper
This file seems to be a shell script dropper, using wget, ftpget and/or curl. More information about the corresponding payload URLs are shown below.
| URL | Malware sample (SHA256 hash) | Signature | Tags |
|---|---|---|---|
| http://78.159.131.11/skid.mips | n/a | n/a | ddos elf mirai |
| http://78.159.131.11/skid.mipsel | n/a | n/a | ddos elf mirai |
| http://78.159.131.11/skid.armv4l | n/a | n/a | ddos elf mirai |
| http://78.159.131.11/skid.armv5l | 5199493171a36a2a1ba7ddedb814caafb57cd1bcb047ba9dc8253375e1a8b418 | Mirai | ddos elf mirai |
| http://78.159.131.11/skid.armv7l | 5b3466b4b2495b829c6cc3686a3773ebd1615438624b46c81acb3ac719f3d14e | Mirai | ddos elf mirai |
| http://78.159.131.11/ppc | n/a | n/a | n/a |
| http://78.159.131.11/sh4 | n/a | n/a | n/a |
Intelligence
File Origin
# of uploads :
1
# of downloads :
58
Origin country :
DEVendor Threat Intelligence
Verdict:
Suspicious
Score:
50%
Link:
Tags:
agent hype sage
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-04-18 12:49:25 UTC
File Type:
Text (Shell)
AV detection:
12 of 38 (31.58%)
Threat level:
2/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
sh f5eccdd0753e63302d0015449a211a825fc1ee0b0dddcdd4f7a6746ceb8d9e84
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.