MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2b6d5bc145bce17aaabb3e8049e78ae862983a66b01cdcf174a65a14e89112d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 2b6d5bc145bce17aaabb3e8049e78ae862983a66b01cdcf174a65a14e89112d9
SHA3-384 hash: a8c5f46fc823be6e8a69fce8e435d5db951602f0a4bc1e0ff07f8679d6c58c51519cf23a30049ba5c3a06921df114736
SHA1 hash: 23128cd9bea33bf75de80cc264d58beecae22d70
MD5 hash: 9ee048392824208493deaa135dae624b
humanhash: sad-india-coffee-cup
File name:asus.sh
Download: download sample
Signature Gafgyt
File size:1'047 bytes
First seen:2025-08-23 02:53:10 UTC
Last seen:2025-08-23 11:40:19 UTC
File type: sh
MIME type:text/plain
ssdeep 24:E22IbO5zOt+MB0h2Rkr1p1mkrBukrxZ16krIPk1:EAO5CEA0okEkQk1Z8k6k1
TLSH T1E511C9CF12A2CCA0DCA81DDA36420C14E48DE6D425CBCE8CE2CDA135D4CDD48BAA1F6C
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/a/armv4lfe062adc1c4604ed092a84dea0d72d78b3059a33042226dd508c22d1913699b5 Gafgytelf gafgyt mirai ua-wget
http://158.51.126.131/a/armv5l59223ccb12bf881758c187d78b27f16ef50ceb827a8f3e17620d35ed5edd5ffb Gafgytelf gafgyt ua-wget
http://158.51.126.131/a/armv7lae4d536c9c58acf6a3aa480d93af821bed11dfb4d4c2c5a1cc783e719f247b72 Gafgytelf gafgyt ua-wget
http://158.51.126.131/a/mipsccfbef911cde9e7eaf2eca7d8c8a52977d308c9f338f851706b559aafd227005 Gafgyt32-bit elf gafgyt Mozi
http://158.51.126.131/a/mipselda8bfa3142d0bece5427ced3393c62e0a919a4951bbf7984bf19522b3c55493d Gafgyt32-bit elf gafgyt Mozi

Intelligence


File Origin
# of uploads :
2
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Verdict:
Malicious
File Type:
ps1
First seen:
2025-08-23T00:01:00Z UTC
Last seen:
2025-08-23T00:01:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=02946bad-1600-0000-0a24-3adcf80c0000 pid=3320 /usr/bin/sudo guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327 /tmp/sample.bin guuid=02946bad-1600-0000-0a24-3adcf80c0000 pid=3320->guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327 execve guuid=1715c3af-1600-0000-0a24-3adc010d0000 pid=3329 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=1715c3af-1600-0000-0a24-3adc010d0000 pid=3329 clone guuid=7e4d3cb1-1600-0000-0a24-3adc0c0d0000 pid=3340 /usr/bin/rm delete-file guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=7e4d3cb1-1600-0000-0a24-3adc0c0d0000 pid=3340 execve guuid=a54c9db1-1600-0000-0a24-3adc0d0d0000 pid=3341 /usr/bin/rm delete-file guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=a54c9db1-1600-0000-0a24-3adc0d0d0000 pid=3341 execve guuid=a1dcdbb1-1600-0000-0a24-3adc0f0d0000 pid=3343 /usr/bin/rm delete-file guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=a1dcdbb1-1600-0000-0a24-3adc0f0d0000 pid=3343 execve guuid=23bc28b2-1600-0000-0a24-3adc100d0000 pid=3344 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=23bc28b2-1600-0000-0a24-3adc100d0000 pid=3344 clone guuid=c685b8b2-1600-0000-0a24-3adc120d0000 pid=3346 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=c685b8b2-1600-0000-0a24-3adc120d0000 pid=3346 clone guuid=63601ab3-1600-0000-0a24-3adc150d0000 pid=3349 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=63601ab3-1600-0000-0a24-3adc150d0000 pid=3349 clone guuid=6a4075e5-1600-0000-0a24-3adc8f0d0000 pid=3471 /usr/bin/chmod guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=6a4075e5-1600-0000-0a24-3adc8f0d0000 pid=3471 execve guuid=72ccb7e5-1600-0000-0a24-3adc900d0000 pid=3472 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=72ccb7e5-1600-0000-0a24-3adc900d0000 pid=3472 clone guuid=843257e6-1600-0000-0a24-3adc930d0000 pid=3475 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=843257e6-1600-0000-0a24-3adc930d0000 pid=3475 clone guuid=7c51dd18-1700-0000-0a24-3adce90d0000 pid=3561 /usr/bin/chmod guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=7c51dd18-1700-0000-0a24-3adce90d0000 pid=3561 execve guuid=ea143119-1700-0000-0a24-3adceb0d0000 pid=3563 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=ea143119-1700-0000-0a24-3adceb0d0000 pid=3563 clone guuid=0780ea19-1700-0000-0a24-3adcef0d0000 pid=3567 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=0780ea19-1700-0000-0a24-3adcef0d0000 pid=3567 clone guuid=62bfe44c-1700-0000-0a24-3adc510e0000 pid=3665 /usr/bin/chmod guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=62bfe44c-1700-0000-0a24-3adc510e0000 pid=3665 execve guuid=d02b554d-1700-0000-0a24-3adc530e0000 pid=3667 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=d02b554d-1700-0000-0a24-3adc530e0000 pid=3667 clone guuid=d90e4a4e-1700-0000-0a24-3adc580e0000 pid=3672 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=d90e4a4e-1700-0000-0a24-3adc580e0000 pid=3672 clone guuid=758f4781-1700-0000-0a24-3adcee0e0000 pid=3822 /usr/bin/chmod guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=758f4781-1700-0000-0a24-3adcee0e0000 pid=3822 execve guuid=bb31bf81-1700-0000-0a24-3adcf00e0000 pid=3824 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=bb31bf81-1700-0000-0a24-3adcf00e0000 pid=3824 clone guuid=8feba382-1700-0000-0a24-3adcf50e0000 pid=3829 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=8feba382-1700-0000-0a24-3adcf50e0000 pid=3829 clone guuid=696d23b5-1700-0000-0a24-3adc680f0000 pid=3944 /usr/bin/chmod guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=696d23b5-1700-0000-0a24-3adc680f0000 pid=3944 execve guuid=20d48cb5-1700-0000-0a24-3adc6c0f0000 pid=3948 /usr/bin/dash guuid=fcde63af-1600-0000-0a24-3adcff0c0000 pid=3327->guuid=20d48cb5-1700-0000-0a24-3adc6c0f0000 pid=3948 clone guuid=32e2dbaf-1600-0000-0a24-3adc030d0000 pid=3331 /usr/bin/cat guuid=1715c3af-1600-0000-0a24-3adc010d0000 pid=3329->guuid=32e2dbaf-1600-0000-0a24-3adc030d0000 pid=3331 execve guuid=ee96e6af-1600-0000-0a24-3adc040d0000 pid=3332 /usr/bin/grep guuid=1715c3af-1600-0000-0a24-3adc010d0000 pid=3329->guuid=ee96e6af-1600-0000-0a24-3adc040d0000 pid=3332 execve guuid=739af0af-1600-0000-0a24-3adc050d0000 pid=3333 /usr/bin/grep guuid=1715c3af-1600-0000-0a24-3adc010d0000 pid=3329->guuid=739af0af-1600-0000-0a24-3adc050d0000 pid=3333 execve guuid=e2ccfaaf-1600-0000-0a24-3adc060d0000 pid=3334 /usr/bin/grep guuid=1715c3af-1600-0000-0a24-3adc010d0000 pid=3329->guuid=e2ccfaaf-1600-0000-0a24-3adc060d0000 pid=3334 execve guuid=d89c0bb0-1600-0000-0a24-3adc070d0000 pid=3335 /usr/bin/cut guuid=1715c3af-1600-0000-0a24-3adc010d0000 pid=3329->guuid=d89c0bb0-1600-0000-0a24-3adc070d0000 pid=3335 execve guuid=0ff133b2-1600-0000-0a24-3adc110d0000 pid=3345 /usr/bin/cp write-file guuid=23bc28b2-1600-0000-0a24-3adc100d0000 pid=3344->guuid=0ff133b2-1600-0000-0a24-3adc110d0000 pid=3345 execve guuid=f5d6c1b2-1600-0000-0a24-3adc130d0000 pid=3347 /usr/bin/chmod guuid=c685b8b2-1600-0000-0a24-3adc120d0000 pid=3346->guuid=f5d6c1b2-1600-0000-0a24-3adc130d0000 pid=3347 execve guuid=c4d223b3-1600-0000-0a24-3adc160d0000 pid=3350 /usr/bin/wget net send-data write-file guuid=63601ab3-1600-0000-0a24-3adc150d0000 pid=3349->guuid=c4d223b3-1600-0000-0a24-3adc160d0000 pid=3350 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=c4d223b3-1600-0000-0a24-3adc160d0000 pid=3350->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=55fe5ce6-1600-0000-0a24-3adc940d0000 pid=3476 /usr/bin/wget net send-data write-file guuid=843257e6-1600-0000-0a24-3adc930d0000 pid=3475->guuid=55fe5ce6-1600-0000-0a24-3adc940d0000 pid=3476 execve guuid=55fe5ce6-1600-0000-0a24-3adc940d0000 pid=3476->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=ea49f619-1700-0000-0a24-3adcf10d0000 pid=3569 /usr/bin/wget net send-data write-file guuid=0780ea19-1700-0000-0a24-3adcef0d0000 pid=3567->guuid=ea49f619-1700-0000-0a24-3adcf10d0000 pid=3569 execve guuid=ea49f619-1700-0000-0a24-3adcf10d0000 pid=3569->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=2f7a534e-1700-0000-0a24-3adc590e0000 pid=3673 /usr/bin/wget net send-data write-file guuid=d90e4a4e-1700-0000-0a24-3adc580e0000 pid=3672->guuid=2f7a534e-1700-0000-0a24-3adc590e0000 pid=3673 execve guuid=2f7a534e-1700-0000-0a24-3adc590e0000 pid=3673->2beca644-24da-5e18-bc49-c06b8c4a111d send: 135B guuid=78aab182-1700-0000-0a24-3adcf60e0000 pid=3830 /usr/bin/wget net send-data write-file guuid=8feba382-1700-0000-0a24-3adcf50e0000 pid=3829->guuid=78aab182-1700-0000-0a24-3adcf60e0000 pid=3830 execve guuid=78aab182-1700-0000-0a24-3adcf60e0000 pid=3830->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-08-23 02:53:33 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh 2b6d5bc145bce17aaabb3e8049e78ae862983a66b01cdcf174a65a14e89112d9

(this sample)

  
Delivery method
Distributed via web download

Comments