MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d60b99dcb9736484ff7e6d2bf831f05e36ff94819ccf8d5bd16d1d2e24d3ffc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 3d60b99dcb9736484ff7e6d2bf831f05e36ff94819ccf8d5bd16d1d2e24d3ffc
SHA3-384 hash: 23188f7edd639f9c2d4524c3b8b6b4789712e20b6cadbfc4f3a0a760277fd33ae4ae43a5e3472ba68136f0ff2b9ee010
SHA1 hash: b9c7121b5346b0ef9ef9daa29c14965f87ea0c5b
MD5 hash: a83ee62337e4218437d35daa84961324
humanhash: hawaii-oxygen-sierra-shade
File name:cat.sh
Download: download sample
Signature Gafgyt
File size:1'845 bytes
First seen:2026-01-29 16:43:36 UTC
Last seen:2026-01-30 03:45:37 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 24:TKYicDdBzKtcr1CTlWZPZBM/hfjuj1bCj2j2wa9D6fFIho7jJ0gKJicJbz94BESd:6u1OhNo7Sc
TLSH T16231EECEA1B8D249C598EE00B0F54DCA7336B69075B5463AFCC11EE780C9E543C1DABA
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://31.56.120.29/iran.x86_64f7d18c9a789c65d5be7001a24fc85bcb08ea9e50a6edd99bf93acb0243b5cc2b Gafgytelf gafgyt ua-wget
http://31.56.120.29/iran.aarch64b149da965dbf8b6569de53bd3c05764ca55eade11630ada7aa492ffd8dc11bf2 Miraielf mirai ua-wget
http://31.56.120.29/iran.m68kb37244ac0b144b38fcd1436a02e4fc200c63ef92bb6be35dc00de641629c5c78 Miraielf mirai ua-wget
http://31.56.120.29/iran.mipsef3acaa9f6394dbd124a1e8d587ebdb72f0b09f5da63759383e3f7ccf4d5b1ac Miraielf mirai ua-wget
http://31.56.120.29/iran.mipselb9f855b8e459e5f585609d26e0c4053a07cb65b4ba14dc6d2617b86598359218 Miraielf ua-wget
http://31.56.120.29/iran.powerpcn/an/aelf ua-wget
http://31.56.120.29/iran.sparcd4c471bb5cc7749991c9844a2bdd2f711ae4456c9ec70a6a31e1a6e9d5da35a4 Miraielf ua-wget
http://31.56.120.29/iran.sh48cf9dfac47679c5c4bd67c100fcbdeb14e8783bf8ef3fae52dbd64a187e67a9e Miraielf mirai ua-wget
http://31.56.120.29/iran.arc2745f0ee553aa16064179362d20650ca143fdd8560888778c4b5bc65b33f9e30 Miraielf mirai ua-wget
http://31.56.120.29/iran.i486c8aa6c553351d412e620c3921013fa88662f5e05be5ed09391f4c1c1a53d7bed Miraielf mirai ua-wget
http://31.56.120.29/iran.armv4l0705956d1a7d22017b5f374134ff92b8588123cbe27c61b9e049a2bd35550001 Miraielf mirai ua-wget
http://31.56.120.29/iran.armv5lf43bde96f95443a3f2af30fc5efaf5d6ec7f3bcc61d189fee6da1457d62d55a1 Miraielf mirai ua-wget
http://31.56.120.29/iran.armv6lca81960eef221ec9773cdecb56c60998fd89381884b5242538e716ec5f8422bd Miraielf mirai ua-wget
http://31.56.120.29/iran.armv7la0bd37ac0f19124b4aef184e55be1c7e38ab7b607c8bb2b134ed7a942c4b283d Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-29T13:56:00Z UTC
Last seen:
2026-01-30T12:53:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=b247a267-1900-0000-375c-e660590b0000 pid=2905 /usr/bin/sudo guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911 /tmp/sample.bin guuid=b247a267-1900-0000-375c-e660590b0000 pid=2905->guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911 execve guuid=c853196a-1900-0000-375c-e660600b0000 pid=2912 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=c853196a-1900-0000-375c-e660600b0000 pid=2912 execve guuid=ac05d66e-1900-0000-375c-e660660b0000 pid=2918 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=ac05d66e-1900-0000-375c-e660660b0000 pid=2918 execve guuid=8be9726f-1900-0000-375c-e660670b0000 pid=2919 /home/sandbox/iran.x86_64 mprotect-exec guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=8be9726f-1900-0000-375c-e660670b0000 pid=2919 execve guuid=4a14f470-1900-0000-375c-e6606a0b0000 pid=2922 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=4a14f470-1900-0000-375c-e6606a0b0000 pid=2922 execve guuid=3ffe2576-1900-0000-375c-e660720b0000 pid=2930 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=3ffe2576-1900-0000-375c-e660720b0000 pid=2930 execve guuid=ae3ab976-1900-0000-375c-e660730b0000 pid=2931 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=ae3ab976-1900-0000-375c-e660730b0000 pid=2931 clone guuid=9ab4c777-1900-0000-375c-e660760b0000 pid=2934 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=9ab4c777-1900-0000-375c-e660760b0000 pid=2934 execve guuid=e53e007d-1900-0000-375c-e6607e0b0000 pid=2942 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=e53e007d-1900-0000-375c-e6607e0b0000 pid=2942 execve guuid=07355d7d-1900-0000-375c-e6607f0b0000 pid=2943 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=07355d7d-1900-0000-375c-e6607f0b0000 pid=2943 clone guuid=f2fe637e-1900-0000-375c-e660830b0000 pid=2947 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=f2fe637e-1900-0000-375c-e660830b0000 pid=2947 execve guuid=512afe82-1900-0000-375c-e6608d0b0000 pid=2957 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=512afe82-1900-0000-375c-e6608d0b0000 pid=2957 execve guuid=064e4a83-1900-0000-375c-e6608e0b0000 pid=2958 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=064e4a83-1900-0000-375c-e6608e0b0000 pid=2958 clone guuid=16fa0b85-1900-0000-375c-e660940b0000 pid=2964 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=16fa0b85-1900-0000-375c-e660940b0000 pid=2964 execve guuid=2d75f789-1900-0000-375c-e6609e0b0000 pid=2974 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=2d75f789-1900-0000-375c-e6609e0b0000 pid=2974 execve guuid=9f014c8a-1900-0000-375c-e6609f0b0000 pid=2975 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=9f014c8a-1900-0000-375c-e6609f0b0000 pid=2975 clone guuid=30f0108d-1900-0000-375c-e660a70b0000 pid=2983 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=30f0108d-1900-0000-375c-e660a70b0000 pid=2983 execve guuid=3d8b4092-1900-0000-375c-e660b30b0000 pid=2995 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=3d8b4092-1900-0000-375c-e660b30b0000 pid=2995 execve guuid=7a0da092-1900-0000-375c-e660b40b0000 pid=2996 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=7a0da092-1900-0000-375c-e660b40b0000 pid=2996 clone guuid=ac03ab94-1900-0000-375c-e660bb0b0000 pid=3003 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=ac03ab94-1900-0000-375c-e660bb0b0000 pid=3003 execve guuid=7d0c4c97-1900-0000-375c-e660c30b0000 pid=3011 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=7d0c4c97-1900-0000-375c-e660c30b0000 pid=3011 execve guuid=370f8d97-1900-0000-375c-e660c40b0000 pid=3012 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=370f8d97-1900-0000-375c-e660c40b0000 pid=3012 clone guuid=539e5398-1900-0000-375c-e660c80b0000 pid=3016 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=539e5398-1900-0000-375c-e660c80b0000 pid=3016 execve guuid=61210c9d-1900-0000-375c-e660d20b0000 pid=3026 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=61210c9d-1900-0000-375c-e660d20b0000 pid=3026 execve guuid=2c4c4c9d-1900-0000-375c-e660d40b0000 pid=3028 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=2c4c4c9d-1900-0000-375c-e660d40b0000 pid=3028 clone guuid=80be5f9e-1900-0000-375c-e660d80b0000 pid=3032 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=80be5f9e-1900-0000-375c-e660d80b0000 pid=3032 execve guuid=257941a3-1900-0000-375c-e660e10b0000 pid=3041 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=257941a3-1900-0000-375c-e660e10b0000 pid=3041 execve guuid=e901bba3-1900-0000-375c-e660e20b0000 pid=3042 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=e901bba3-1900-0000-375c-e660e20b0000 pid=3042 clone guuid=a7cc85a5-1900-0000-375c-e660e60b0000 pid=3046 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=a7cc85a5-1900-0000-375c-e660e60b0000 pid=3046 execve guuid=6f1fd4aa-1900-0000-375c-e660f40b0000 pid=3060 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=6f1fd4aa-1900-0000-375c-e660f40b0000 pid=3060 execve guuid=9a1f27ab-1900-0000-375c-e660f60b0000 pid=3062 /home/sandbox/iran.i486 guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=9a1f27ab-1900-0000-375c-e660f60b0000 pid=3062 execve guuid=d33f93ab-1900-0000-375c-e660f90b0000 pid=3065 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=d33f93ab-1900-0000-375c-e660f90b0000 pid=3065 execve guuid=036cefaf-1900-0000-375c-e660060c0000 pid=3078 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=036cefaf-1900-0000-375c-e660060c0000 pid=3078 execve guuid=f60c46b0-1900-0000-375c-e660080c0000 pid=3080 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=f60c46b0-1900-0000-375c-e660080c0000 pid=3080 clone guuid=851916b1-1900-0000-375c-e6600c0c0000 pid=3084 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=851916b1-1900-0000-375c-e6600c0c0000 pid=3084 execve guuid=a4ecceb6-1900-0000-375c-e660190c0000 pid=3097 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=a4ecceb6-1900-0000-375c-e660190c0000 pid=3097 execve guuid=2e011cb7-1900-0000-375c-e6601a0c0000 pid=3098 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=2e011cb7-1900-0000-375c-e6601a0c0000 pid=3098 clone guuid=d56e9fb7-1900-0000-375c-e6601e0c0000 pid=3102 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=d56e9fb7-1900-0000-375c-e6601e0c0000 pid=3102 execve guuid=aaad65bd-1900-0000-375c-e6602d0c0000 pid=3117 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=aaad65bd-1900-0000-375c-e6602d0c0000 pid=3117 execve guuid=60bca3bd-1900-0000-375c-e6602e0c0000 pid=3118 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=60bca3bd-1900-0000-375c-e6602e0c0000 pid=3118 clone guuid=38e8c1bf-1900-0000-375c-e660350c0000 pid=3125 /usr/bin/wget net send-data write-file guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=38e8c1bf-1900-0000-375c-e660350c0000 pid=3125 execve guuid=dc0df3c3-1900-0000-375c-e6603e0c0000 pid=3134 /usr/bin/chmod guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=dc0df3c3-1900-0000-375c-e6603e0c0000 pid=3134 execve guuid=7e8849c4-1900-0000-375c-e660400c0000 pid=3136 /usr/bin/dash guuid=cac0c869-1900-0000-375c-e6605f0b0000 pid=2911->guuid=7e8849c4-1900-0000-375c-e660400c0000 pid=3136 clone 2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 31.56.120.29:80 guuid=c853196a-1900-0000-375c-e660600b0000 pid=2912->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 138B guuid=82badc70-1900-0000-375c-e660680b0000 pid=2920 /home/sandbox/iran.x86_64 zombie guuid=8be9726f-1900-0000-375c-e660670b0000 pid=2919->guuid=82badc70-1900-0000-375c-e660680b0000 pid=2920 clone guuid=9c77ed70-1900-0000-375c-e660690b0000 pid=2921 /home/sandbox/iran.x86_64 delete-file net zombie guuid=82badc70-1900-0000-375c-e660680b0000 pid=2920->guuid=9c77ed70-1900-0000-375c-e660690b0000 pid=2921 clone 7dca31a5-146b-59c3-bf1d-272eb64afc14 31.56.120.29:7080 guuid=9c77ed70-1900-0000-375c-e660690b0000 pid=2921->7dca31a5-146b-59c3-bf1d-272eb64afc14 con guuid=4a14f470-1900-0000-375c-e6606a0b0000 pid=2922->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 139B guuid=9ab4c777-1900-0000-375c-e660760b0000 pid=2934->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 136B guuid=f2fe637e-1900-0000-375c-e660830b0000 pid=2947->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 136B guuid=16fa0b85-1900-0000-375c-e660940b0000 pid=2964->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 138B guuid=30f0108d-1900-0000-375c-e660a70b0000 pid=2983->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 139B guuid=ac03ab94-1900-0000-375c-e660bb0b0000 pid=3003->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 137B guuid=539e5398-1900-0000-375c-e660c80b0000 pid=3016->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 135B guuid=80be5f9e-1900-0000-375c-e660d80b0000 pid=3032->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 135B guuid=a7cc85a5-1900-0000-375c-e660e60b0000 pid=3046->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 136B guuid=aaa585ab-1900-0000-375c-e660f80b0000 pid=3064 /home/sandbox/iran.i486 guuid=9a1f27ab-1900-0000-375c-e660f60b0000 pid=3062->guuid=aaa585ab-1900-0000-375c-e660f80b0000 pid=3064 clone guuid=ea8396ab-1900-0000-375c-e660fa0b0000 pid=3066 /home/sandbox/iran.i486 delete-file net zombie guuid=aaa585ab-1900-0000-375c-e660f80b0000 pid=3064->guuid=ea8396ab-1900-0000-375c-e660fa0b0000 pid=3066 clone guuid=d33f93ab-1900-0000-375c-e660f90b0000 pid=3065->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 138B guuid=ea8396ab-1900-0000-375c-e660fa0b0000 pid=3066->7dca31a5-146b-59c3-bf1d-272eb64afc14 con guuid=851916b1-1900-0000-375c-e6600c0c0000 pid=3084->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 138B guuid=d56e9fb7-1900-0000-375c-e6601e0c0000 pid=3102->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 138B guuid=38e8c1bf-1900-0000-375c-e660350c0000 pid=3125->2c2b471a-c9f5-51d7-8a7f-79a5c13f8c72 send: 138B
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-29 16:35:43 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
UPX packed file
Enumerates running processes
File and Directory Permissions Modification
Deletes itself
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh 3d60b99dcb9736484ff7e6d2bf831f05e36ff94819ccf8d5bd16d1d2e24d3ffc

(this sample)

  
Delivery method
Distributed via web download

Comments