MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2828ec15d173f8c4727582fd144c4b21591ccb79edc0c7b025e198c1db807b65. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 2828ec15d173f8c4727582fd144c4b21591ccb79edc0c7b025e198c1db807b65
SHA3-384 hash: 1d32e6cd33e1d6d10cd97ba4676151f6b4baa300e85b85320173d3dab715268465ec1df5d830c1fe8c892c40ecf68149
SHA1 hash: 1747ff93fda652b411ffe17e53895bd443f8e9cf
MD5 hash: b38d03fa87a984b3776d5498c7869669
humanhash: island-florida-pasta-table
File name:w.sh
Download: download sample
Signature Gafgyt
File size:1'222 bytes
First seen:2025-11-29 19:04:09 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:tBE52NGEcJNENIZEtsNUEVKTDNtEHqNUEO/NKMETKNS3E3eM0NOEKPlN7Ez8N5E/:S2mJ+sFQDKqK/YpKQEeBcPlS8Cu+rx
TLSH T1182121CF1164BA55084CCF482066859871E4CBD0F0E50E4B998D79FBF584B2B713DF89
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://144.172.94.115/bins/Fantazy.armn/an/aelf ua-wget
http://144.172.94.115/bins/Fantazy.arm541e4d207689732360f3b64167c5f6f9ad4446e7d5de7b280884c0d51c8054a7f Gafgytarm elf gafgyt geofenced mirai ua-wget USA
http://144.172.94.115/bins/Fantazy.arm66cd07b180c64d7090e20c9d3098bf1ae25e563f03d0da5157674be7c843be2ff Gafgytarm elf gafgyt geofenced mirai ua-wget USA
http://144.172.94.115/bins/Fantazy.arm74df65fc7b61ad049919e088dc648552175871171ca49cf00862aea4c38534de9 Gafgytarm elf gafgyt geofenced mirai ua-wget USA
http://144.172.94.115/bins/Fantazy.m68k316d9577e8d4b07a5d1d67bdbc96b97c1f8ab7dfb9c35db3bedc1c89be9e9b4f Gafgytelf gafgyt geofenced m68k mirai ua-wget USA
http://144.172.94.115/bins/Fantazy.mips1e560c14e3c5354e358f52a1823de95c97241955ff5227731feb00f4fa94843d Gafgytelf gafgyt geofenced mips mirai ua-wget USA
http://144.172.94.115/bins/Fantazy.mpsln/an/aelf ua-wget
http://144.172.94.115/bins/Fantazy.ppc03a1e30b7dffb0cf98d176e3a43de17def78589fab62f4518dd00cd9adfbb40b Gafgytelf gafgyt geofenced mirai PowerPC ua-wget USA
http://144.172.94.115/bins/Fantazy.sh41b04b273b5eaef3c9409176fee70dfc84b61363206419a8c5d0a0fccfac59710 Gafgytelf gafgyt geofenced mirai SuperH ua-wget USA
http://144.172.94.115/bins/Fantazy.spcn/an/aelf ua-wget
http://144.172.94.115/bins/Fantazy.x864e9b3f060aec87b300bc99aa7ad611516d08e63068c9f02c761b58338a5ba0ea Gafgytelf gafgyt geofenced mirai ua-wget USA x86
http://144.172.94.115/bins/Fantazy.x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
busybox mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-11-29T17:39:00Z UTC
Last seen:
2025-11-30T01:37:00Z UTC
Hits:
~10
Threat name:
Linux.Downloader.Generic
Status:
Suspicious
First seen:
2025-11-29 07:23:16 UTC
File Type:
Text (Shell)
AV detection:
13 of 36 (36.11%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh 2828ec15d173f8c4727582fd144c4b21591ccb79edc0c7b025e198c1db807b65

(this sample)

  
Delivery method
Distributed via web download

Comments