MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b60235adbed0380f8d11f1b5c13eec42a2e8fcf42f75d0d802eefe273e2f717. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4b60235adbed0380f8d11f1b5c13eec42a2e8fcf42f75d0d802eefe273e2f717
SHA3-384 hash: 2e93242e2a20eba29a39401384f527416069fc3ad3b0edbee14f96a702dfab478c73f8785acadcee3bb0fec84cdf56b2
SHA1 hash: 07737dce04d7f61ca0169961cd6bcde5e69a155c
MD5 hash: e421cd973072440a230d9a259b184e75
humanhash: uniform-fix-october-spring
File name:curl.sh
Download: download sample
File size:790 bytes
First seen:2025-11-22 12:14:56 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KhI5W3CtI1/TbN/pBwBt/G1npLOhc/U26/AliAE//hqlHW/zoJi5/I3bQW/5ecr:KOQyS1bbjB/1npLOZEliAuqlOoJFbCcr
TLSH T1CA01DBC842615673D34CDE1FB693807E422AF2CC50261BD4F9A746798680BC5F518A77
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.100.22/arme6c563c09c5b0d3ece466e66741c73e24763c901a9511f2664128ba80ee653af Mirai32-bit elf mirai Mozi
http://196.251.100.22/arm507ad16f0878b5af7f123753058da3660d83cac7a6244038fa82a5279ecbcdec7 Miraielf mirai ua-wget
http://196.251.100.22/arm70feffdb13c3bce429c074cf1b5d10a33001b34a4e21d014d5f5151a9d01283f6 Miraielf mirai ua-wget
http://196.251.100.22/mips7496c6976b0e8438ea6f69e103f1af1e6d501a7fe26380914cbfc4010d6cf5b5 Mirai32-bit elf mirai Mozi
http://196.251.100.22/mpsl1e8f3cf5b4d3f882baf522d62bf9fc105fc34ad3562f0d2dca48dad26f5e2b26 Miraielf mirai ua-wget
http://196.251.100.22/arcd633d1ca4811f232d0594a19e7fb1caff2af4de4c229d06a60e0ae31068a5bd6 Miraielf mirai ua-wget
http://196.251.100.22/aarch64f5433635d351bd7e97ec67483b7bbd10618996afac326c6c65cb12bbb7b1a28e Miraielf mirai ua-wget
http://196.251.100.22/powerpcn/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-11-22T09:30:00Z UTC
Last seen:
2025-11-23T10:38:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=d02b8c5d-1900-0000-685e-5077000f0000 pid=3840 /usr/bin/sudo guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846 /tmp/sample.bin guuid=d02b8c5d-1900-0000-685e-5077000f0000 pid=3840->guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846 execve guuid=96e7915f-1900-0000-685e-5077070f0000 pid=3847 /usr/bin/rm guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=96e7915f-1900-0000-685e-5077070f0000 pid=3847 execve guuid=78811360-1900-0000-685e-5077090f0000 pid=3849 /usr/bin/rm guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=78811360-1900-0000-685e-5077090f0000 pid=3849 execve guuid=17355b60-1900-0000-685e-50770a0f0000 pid=3850 /usr/bin/rm guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=17355b60-1900-0000-685e-50770a0f0000 pid=3850 execve guuid=579baa60-1900-0000-685e-50770b0f0000 pid=3851 /usr/bin/rm guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=579baa60-1900-0000-685e-50770b0f0000 pid=3851 execve guuid=bc920661-1900-0000-685e-50770c0f0000 pid=3852 /usr/bin/rm guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=bc920661-1900-0000-685e-50770c0f0000 pid=3852 execve guuid=74534461-1900-0000-685e-50770f0f0000 pid=3855 /usr/bin/rm guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=74534461-1900-0000-685e-50770f0f0000 pid=3855 execve guuid=6cd47c61-1900-0000-685e-5077110f0000 pid=3857 /usr/bin/rm guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=6cd47c61-1900-0000-685e-5077110f0000 pid=3857 execve guuid=6279c861-1900-0000-685e-5077120f0000 pid=3858 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=6279c861-1900-0000-685e-5077120f0000 pid=3858 execve guuid=7bbbad7b-1900-0000-685e-5077660f0000 pid=3942 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=7bbbad7b-1900-0000-685e-5077660f0000 pid=3942 execve guuid=b6cee37b-1900-0000-685e-5077680f0000 pid=3944 /usr/bin/dash guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=b6cee37b-1900-0000-685e-5077680f0000 pid=3944 clone guuid=8946707c-1900-0000-685e-50776d0f0000 pid=3949 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=8946707c-1900-0000-685e-50776d0f0000 pid=3949 execve guuid=320bd881-1900-0000-685e-5077800f0000 pid=3968 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=320bd881-1900-0000-685e-5077800f0000 pid=3968 execve guuid=e9482382-1900-0000-685e-5077810f0000 pid=3969 /usr/bin/dash guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=e9482382-1900-0000-685e-5077810f0000 pid=3969 clone guuid=c71e9982-1900-0000-685e-5077860f0000 pid=3974 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=c71e9982-1900-0000-685e-5077860f0000 pid=3974 execve guuid=e5c2fe87-1900-0000-685e-50779b0f0000 pid=3995 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=e5c2fe87-1900-0000-685e-50779b0f0000 pid=3995 execve guuid=837e3388-1900-0000-685e-50779d0f0000 pid=3997 /usr/bin/dash guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=837e3388-1900-0000-685e-50779d0f0000 pid=3997 clone guuid=8b8cb388-1900-0000-685e-5077a20f0000 pid=4002 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=8b8cb388-1900-0000-685e-5077a20f0000 pid=4002 execve guuid=4f86618c-1900-0000-685e-5077b10f0000 pid=4017 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=4f86618c-1900-0000-685e-5077b10f0000 pid=4017 execve guuid=5f98a98c-1900-0000-685e-5077b20f0000 pid=4018 /usr/bin/dash guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=5f98a98c-1900-0000-685e-5077b20f0000 pid=4018 clone guuid=cab5ec8d-1900-0000-685e-5077b80f0000 pid=4024 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=cab5ec8d-1900-0000-685e-5077b80f0000 pid=4024 execve guuid=d5c6cf94-1900-0000-685e-5077d00f0000 pid=4048 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=d5c6cf94-1900-0000-685e-5077d00f0000 pid=4048 execve guuid=240c0995-1900-0000-685e-5077d20f0000 pid=4050 /usr/bin/dash guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=240c0995-1900-0000-685e-5077d20f0000 pid=4050 clone guuid=926a8895-1900-0000-685e-5077d70f0000 pid=4055 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=926a8895-1900-0000-685e-5077d70f0000 pid=4055 execve guuid=8a5be19b-1900-0000-685e-5077f30f0000 pid=4083 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=8a5be19b-1900-0000-685e-5077f30f0000 pid=4083 execve guuid=e8a9519c-1900-0000-685e-5077f60f0000 pid=4086 /usr/bin/dash guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=e8a9519c-1900-0000-685e-5077f60f0000 pid=4086 clone guuid=0487f99c-1900-0000-685e-5077fa0f0000 pid=4090 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=0487f99c-1900-0000-685e-5077fa0f0000 pid=4090 execve guuid=9821b8a0-1900-0000-685e-507708100000 pid=4104 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=9821b8a0-1900-0000-685e-507708100000 pid=4104 execve guuid=5d2deea0-1900-0000-685e-50770a100000 pid=4106 /usr/bin/dash guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=5d2deea0-1900-0000-685e-50770a100000 pid=4106 clone guuid=dddd5fa1-1900-0000-685e-50770e100000 pid=4110 /usr/bin/curl net send-data write-file guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=dddd5fa1-1900-0000-685e-50770e100000 pid=4110 execve guuid=93becfa7-1900-0000-685e-50771e100000 pid=4126 /usr/bin/chmod guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=93becfa7-1900-0000-685e-50771e100000 pid=4126 execve guuid=d57f21a8-1900-0000-685e-507720100000 pid=4128 /home/sandbox/DKANXC guuid=75c24f5f-1900-0000-685e-5077060f0000 pid=3846->guuid=d57f21a8-1900-0000-685e-507720100000 pid=4128 execve eaf80363-0b40-5228-99a0-aee4bf7af593 196.251.100.22:80 guuid=6279c861-1900-0000-685e-5077120f0000 pid=3858->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 81B guuid=8946707c-1900-0000-685e-50776d0f0000 pid=3949->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 82B guuid=c71e9982-1900-0000-685e-5077860f0000 pid=3974->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 82B guuid=8b8cb388-1900-0000-685e-5077a20f0000 pid=4002->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 82B guuid=cab5ec8d-1900-0000-685e-5077b80f0000 pid=4024->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 82B guuid=926a8895-1900-0000-685e-5077d70f0000 pid=4055->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 81B guuid=0487f99c-1900-0000-685e-5077fa0f0000 pid=4090->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 85B guuid=dddd5fa1-1900-0000-685e-50770e100000 pid=4110->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 85B
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-11-22 12:07:52 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Deletes system logs
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (32519) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 4b60235adbed0380f8d11f1b5c13eec42a2e8fcf42f75d0d802eefe273e2f717

(this sample)

  
Delivery method
Distributed via web download

Comments