MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42ef726d480054768cd99bac4e78e85a17198e9c59fbb9cbd2341b4e27eb34ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 42ef726d480054768cd99bac4e78e85a17198e9c59fbb9cbd2341b4e27eb34ec
SHA3-384 hash: 4ae703bda84f5cdd5ee4c12041a9b9d5c84978778d519bd31d4c57990fed5539a5a5d785c6b540ae044f3f9037747de7
SHA1 hash: 56877c58a86009e5b6dbf492d7eef68174cb3904
MD5 hash: 33ff06de6c42d32db4b7c1bd0b17afe1
humanhash: table-undress-social-oregon
File name:massload
Download: download sample
Signature Gafgyt
File size:1'137 bytes
First seen:2025-08-27 06:14:53 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 24:boWBGhBh9Mk8QoOwxQiD/cgzje6b3c3qKXmatkk0:boGGhL8QoIgRTat/0
TLSH T185219BCDF590E3714C6C9E00B1D2C826A01A57D720A05E69B89F1E67BCACE05F458F36
Magika shell
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.48/mipsfd75057993af111cf29aeb0924554d01ad28c071fb20cf9700831fd4402fbaf2 Miraielf gafgyt geofenced mips mirai ua-wget USA
http://160.250.134.48/mpslfc2117cb6a4433fc0a3711ce912f4a1794741dfe467cf7c64ac9250e125b927c Miraielf geofenced mips mirai ua-wget USA
http://160.250.134.48/arme16a5e543be159372994cf2bd528b703cfc4ebe667e153a34de20e13de0bc265 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm5ef0759560923799625dbffbc95e23935d0c09da4aad0e7e285a24510c1255a97 Miraiarm elf geofenced mirai ua-wget USA
http://160.250.134.48/arm76509f8d5312e74b83dcc973477b33d6a439bc050545d2bc54962f9b43d8ddf88 Miraiarm elf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Labled as:
Trojan[Downloader]/Shell.Agent
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-08-27T04:20:00Z UTC
Last seen:
2025-08-27T04:20:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=85a44ee0-1600-0000-cd50-bf6e530e0000 pid=3667 /usr/bin/sudo guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679 /tmp/sample.bin guuid=85a44ee0-1600-0000-cd50-bf6e530e0000 pid=3667->guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679 execve guuid=cf0050e8-1600-0000-cd50-bf6e720e0000 pid=3698 /usr/bin/rm guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=cf0050e8-1600-0000-cd50-bf6e720e0000 pid=3698 execve guuid=4fcf91e8-1600-0000-cd50-bf6e760e0000 pid=3702 /usr/bin/wget net send-data write-file guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=4fcf91e8-1600-0000-cd50-bf6e760e0000 pid=3702 execve guuid=74be2c31-1700-0000-cd50-bf6e790f0000 pid=3961 /usr/bin/chmod guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=74be2c31-1700-0000-cd50-bf6e790f0000 pid=3961 execve guuid=c1b76931-1700-0000-cd50-bf6e7a0f0000 pid=3962 /usr/bin/dash guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=c1b76931-1700-0000-cd50-bf6e7a0f0000 pid=3962 clone guuid=c659e631-1700-0000-cd50-bf6e7e0f0000 pid=3966 /usr/bin/wget net send-data write-file guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=c659e631-1700-0000-cd50-bf6e7e0f0000 pid=3966 execve guuid=26150a87-1700-0000-cd50-bf6ef5100000 pid=4341 /usr/bin/chmod guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=26150a87-1700-0000-cd50-bf6ef5100000 pid=4341 execve guuid=97258487-1700-0000-cd50-bf6ef9100000 pid=4345 /usr/bin/dash guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=97258487-1700-0000-cd50-bf6ef9100000 pid=4345 clone guuid=afcc6188-1700-0000-cd50-bf6efc100000 pid=4348 /usr/bin/wget net send-data write-file guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=afcc6188-1700-0000-cd50-bf6efc100000 pid=4348 execve guuid=3c6cdece-1700-0000-cd50-bf6eac110000 pid=4524 /usr/bin/chmod guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=3c6cdece-1700-0000-cd50-bf6eac110000 pid=4524 execve guuid=379040cf-1700-0000-cd50-bf6eb0110000 pid=4528 /usr/bin/dash guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=379040cf-1700-0000-cd50-bf6eb0110000 pid=4528 clone guuid=187606d0-1700-0000-cd50-bf6eb3110000 pid=4531 /usr/bin/wget net send-data write-file guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=187606d0-1700-0000-cd50-bf6eb3110000 pid=4531 execve guuid=213bec15-1800-0000-cd50-bf6e53120000 pid=4691 /usr/bin/chmod guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=213bec15-1800-0000-cd50-bf6e53120000 pid=4691 execve guuid=da6b6216-1800-0000-cd50-bf6e54120000 pid=4692 /usr/bin/dash guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=da6b6216-1800-0000-cd50-bf6e54120000 pid=4692 clone guuid=348a5317-1800-0000-cd50-bf6e58120000 pid=4696 /usr/bin/wget net send-data write-file guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=348a5317-1800-0000-cd50-bf6e58120000 pid=4696 execve guuid=1f03465e-1800-0000-cd50-bf6e23130000 pid=4899 /usr/bin/chmod guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=1f03465e-1800-0000-cd50-bf6e23130000 pid=4899 execve guuid=a5f0ac5e-1800-0000-cd50-bf6e25130000 pid=4901 /usr/bin/dash guuid=18a083e2-1600-0000-cd50-bf6e5f0e0000 pid=3679->guuid=a5f0ac5e-1800-0000-cd50-bf6e25130000 pid=4901 clone 2398d6d7-9b73-5561-a5f7-2e279e659454 160.250.134.48:80 guuid=4fcf91e8-1600-0000-cd50-bf6e760e0000 pid=3702->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B guuid=c659e631-1700-0000-cd50-bf6e7e0f0000 pid=3966->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B guuid=afcc6188-1700-0000-cd50-bf6efc100000 pid=4348->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 132B guuid=187606d0-1700-0000-cd50-bf6eb3110000 pid=4531->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B guuid=348a5317-1800-0000-cd50-bf6e58120000 pid=4696->2398d6d7-9b73-5561-a5f7-2e279e659454 send: 133B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-08-27 06:40:12 UTC
File Type:
Text (Shell)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads system network configuration
Reads process memory
Enumerates running processes
Reads MAC address of network interface
Reads system routing table
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh 42ef726d480054768cd99bac4e78e85a17198e9c59fbb9cbd2341b4e27eb34ec

(this sample)

  
Delivery method
Distributed via web download

Comments