MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc1eced0639c6dfceda1eef8b9534417b44ab555941370d316e3f24b2e39c828. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: fc1eced0639c6dfceda1eef8b9534417b44ab555941370d316e3f24b2e39c828
SHA3-384 hash: 3f6cc771194ad28adfbb7af5c9ac44cdeb52d3f3c41dce6682416bcce2016965c41c90eba77713aabea229c6f0884432
SHA1 hash: db46f331720571340d64c4be0fc78c3236295373
MD5 hash: 89a8a1b507a2cc64798bdec3a69c218b
humanhash: montana-twenty-edward-robin
File name:bin.sh
Download: download sample
Signature Gafgyt
File size:742 bytes
First seen:2025-11-23 18:30:29 UTC
Last seen:2025-11-23 19:28:46 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 12:fKUL0FZfm/hEKSKUL0FZfm9H0KUL0FZfm+90tKUL0FZfmliw0XYKKUL0FZfmpf:fXYpm/hIXYpm9H0XYpmbtXYpmliw0oKF
TLSH T18F01FFC661E20A357CA1E92732AA850436C0A59764CB2F8DBDDC74EA80DDE0DB548783
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:gafgyt sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.132.17/pepsin/an/an/a
http://176.65.132.17/colan/an/an/a
http://176.65.132.17/spriten/an/an/a
http://176.65.132.17/fantan/an/an/a
http://176.65.132.17/loln/an/an/a

Intelligence


File Origin
# of uploads :
2
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive medusa mirai
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=bc55dec2-1600-0000-3b68-a3e85a0c0000 pid=3162 /usr/bin/sudo guuid=b6a1b6c5-1600-0000-3b68-a3e85b0c0000 pid=3163 /tmp/sample.bin guuid=bc55dec2-1600-0000-3b68-a3e85a0c0000 pid=3162->guuid=b6a1b6c5-1600-0000-3b68-a3e85b0c0000 pid=3163 execve guuid=ad7e26c6-1600-0000-3b68-a3e85c0c0000 pid=3164 /usr/bin/wget guuid=b6a1b6c5-1600-0000-3b68-a3e85b0c0000 pid=3163->guuid=ad7e26c6-1600-0000-3b68-a3e85c0c0000 pid=3164 execve
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2025-11-23 18:31:22 UTC
File Type:
Text (Shell)
AV detection:
18 of 36 (50.00%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:gafgyt botnet defense_evasion discovery linux
Behaviour
Writes file to shm directory
Reads system network configuration
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Detected Gafgyt variant
Gafgyt family
Gafgyt/Bashlite
Malware Config
C2 Extraction:
176.65.132.17:606
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh fc1eced0639c6dfceda1eef8b9534417b44ab555941370d316e3f24b2e39c828

(this sample)

  
Delivery method
Distributed via web download

Comments