MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 56d6145255aea2570b3ad679c840162d0c2aca2483174f08f69d6515dca97202. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 56d6145255aea2570b3ad679c840162d0c2aca2483174f08f69d6515dca97202
SHA3-384 hash: 755cc17e3e13538f82126ee6096e3c77edea764f66a1fbfaa69a324a832e07d01d05d855eaae5732fcae891b140db083
SHA1 hash: eeacdc24529ec6f1f08b06888989cdfe40a30e89
MD5 hash: 3632cc19df3bb92da7706d630fbce7f3
humanhash: six-crazy-bulldog-california
File name:c.sh
Download: download sample
File size:846 bytes
First seen:2025-10-02 05:48:34 UTC
Last seen:2025-10-03 00:09:48 UTC
File type: sh
MIME type:text/plain
ssdeep 24:3J3n/DTe/D4YG/DpNI7V/DZKl/DU+IJ/D5jw/DTT4/Dclh/D9t8/Dih/DfG/Drn:ZD4D4YcDE1DZCDBIZD5KDHmDmD+DiBD8
TLSH T13C0121CDA27173275F08AF28B0699068902098D17BB6CE96FF748CF4D8DD2403135679
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://139.162.143.187/systemcl/armn/an/aelf ua-wget
http://139.162.143.187/systemcl/arm5n/an/aelf ua-wget
http://139.162.143.187/systemcl/arm6n/an/aelf ua-wget
http://139.162.143.187/systemcl/arm7n/an/aelf ua-wget
http://139.162.143.187/systemcl/m68kn/an/aelf ua-wget
http://139.162.143.187/systemcl/mipsn/an/aelf ua-wget
http://139.162.143.187/systemcl/mpsln/an/aelf ua-wget
http://139.162.143.187/systemcl/ppcn/an/aelf ua-wget
http://139.162.143.187/systemcl/sh4n/an/aelf ua-wget
http://139.162.143.187/systemcl/spcn/an/aelf ua-wget
http://139.162.143.187/systemcl/x86n/an/aelf ua-wget
http://139.162.143.187/systemcl/x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
38
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-10-02T03:57:00Z UTC
Last seen:
2025-10-02T06:50:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=c91d34d4-1a00-0000-2172-deef1a0b0000 pid=2842 /usr/bin/sudo guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849 /tmp/sample.bin guuid=c91d34d4-1a00-0000-2172-deef1a0b0000 pid=2842->guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849 execve guuid=83a9b8d9-1a00-0000-2172-deef220b0000 pid=2850 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=83a9b8d9-1a00-0000-2172-deef220b0000 pid=2850 execve guuid=b58354e9-1a00-0000-2172-deef300b0000 pid=2864 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=b58354e9-1a00-0000-2172-deef300b0000 pid=2864 execve guuid=75bef8e9-1a00-0000-2172-deef320b0000 pid=2866 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=75bef8e9-1a00-0000-2172-deef320b0000 pid=2866 clone guuid=1dea29ea-1a00-0000-2172-deef330b0000 pid=2867 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=1dea29ea-1a00-0000-2172-deef330b0000 pid=2867 execve guuid=05fbf3ed-1a00-0000-2172-deef360b0000 pid=2870 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=05fbf3ed-1a00-0000-2172-deef360b0000 pid=2870 execve guuid=837b7fee-1a00-0000-2172-deef370b0000 pid=2871 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=837b7fee-1a00-0000-2172-deef370b0000 pid=2871 clone guuid=916e94ee-1a00-0000-2172-deef380b0000 pid=2872 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=916e94ee-1a00-0000-2172-deef380b0000 pid=2872 execve guuid=2194faf6-1a00-0000-2172-deef420b0000 pid=2882 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=2194faf6-1a00-0000-2172-deef420b0000 pid=2882 execve guuid=322d4ff7-1a00-0000-2172-deef430b0000 pid=2883 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=322d4ff7-1a00-0000-2172-deef430b0000 pid=2883 clone guuid=d10862f7-1a00-0000-2172-deef450b0000 pid=2885 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=d10862f7-1a00-0000-2172-deef450b0000 pid=2885 execve guuid=44895efa-1a00-0000-2172-deef4b0b0000 pid=2891 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=44895efa-1a00-0000-2172-deef4b0b0000 pid=2891 execve guuid=e99d98fa-1a00-0000-2172-deef4d0b0000 pid=2893 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=e99d98fa-1a00-0000-2172-deef4d0b0000 pid=2893 clone guuid=19609efa-1a00-0000-2172-deef4e0b0000 pid=2894 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=19609efa-1a00-0000-2172-deef4e0b0000 pid=2894 execve guuid=71635dfd-1a00-0000-2172-deef570b0000 pid=2903 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=71635dfd-1a00-0000-2172-deef570b0000 pid=2903 execve guuid=10809bfd-1a00-0000-2172-deef590b0000 pid=2905 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=10809bfd-1a00-0000-2172-deef590b0000 pid=2905 clone guuid=f204a3fd-1a00-0000-2172-deef5a0b0000 pid=2906 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=f204a3fd-1a00-0000-2172-deef5a0b0000 pid=2906 execve guuid=eb9b4400-1b00-0000-2172-deef630b0000 pid=2915 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=eb9b4400-1b00-0000-2172-deef630b0000 pid=2915 execve guuid=f9d5a700-1b00-0000-2172-deef650b0000 pid=2917 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=f9d5a700-1b00-0000-2172-deef650b0000 pid=2917 clone guuid=3b76ba00-1b00-0000-2172-deef670b0000 pid=2919 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=3b76ba00-1b00-0000-2172-deef670b0000 pid=2919 execve guuid=8f2fe803-1b00-0000-2172-deef710b0000 pid=2929 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=8f2fe803-1b00-0000-2172-deef710b0000 pid=2929 execve guuid=4cc23604-1b00-0000-2172-deef740b0000 pid=2932 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=4cc23604-1b00-0000-2172-deef740b0000 pid=2932 clone guuid=6c5f4304-1b00-0000-2172-deef750b0000 pid=2933 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=6c5f4304-1b00-0000-2172-deef750b0000 pid=2933 execve guuid=7a571007-1b00-0000-2172-deef790b0000 pid=2937 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=7a571007-1b00-0000-2172-deef790b0000 pid=2937 execve guuid=3a214b07-1b00-0000-2172-deef7a0b0000 pid=2938 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=3a214b07-1b00-0000-2172-deef7a0b0000 pid=2938 clone guuid=df765407-1b00-0000-2172-deef7b0b0000 pid=2939 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=df765407-1b00-0000-2172-deef7b0b0000 pid=2939 execve guuid=0838890b-1b00-0000-2172-deef850b0000 pid=2949 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=0838890b-1b00-0000-2172-deef850b0000 pid=2949 execve guuid=97afc50b-1b00-0000-2172-deef870b0000 pid=2951 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=97afc50b-1b00-0000-2172-deef870b0000 pid=2951 clone guuid=8a7dd30b-1b00-0000-2172-deef880b0000 pid=2952 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=8a7dd30b-1b00-0000-2172-deef880b0000 pid=2952 execve guuid=0914b00e-1b00-0000-2172-deef8d0b0000 pid=2957 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=0914b00e-1b00-0000-2172-deef8d0b0000 pid=2957 execve guuid=b39d0a0f-1b00-0000-2172-deef8f0b0000 pid=2959 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=b39d0a0f-1b00-0000-2172-deef8f0b0000 pid=2959 clone guuid=3da4150f-1b00-0000-2172-deef900b0000 pid=2960 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=3da4150f-1b00-0000-2172-deef900b0000 pid=2960 execve guuid=d5f40615-1b00-0000-2172-deef970b0000 pid=2967 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=d5f40615-1b00-0000-2172-deef970b0000 pid=2967 execve guuid=83218915-1b00-0000-2172-deef980b0000 pid=2968 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=83218915-1b00-0000-2172-deef980b0000 pid=2968 clone guuid=2d829a15-1b00-0000-2172-deef990b0000 pid=2969 /usr/bin/curl net send-data guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=2d829a15-1b00-0000-2172-deef990b0000 pid=2969 execve guuid=310b341b-1b00-0000-2172-deefa30b0000 pid=2979 /usr/bin/chmod guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=310b341b-1b00-0000-2172-deefa30b0000 pid=2979 execve guuid=e5446d1b-1b00-0000-2172-deefa40b0000 pid=2980 /usr/bin/dash guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=e5446d1b-1b00-0000-2172-deefa40b0000 pid=2980 clone guuid=84177b1b-1b00-0000-2172-deefa50b0000 pid=2981 /usr/bin/rm delete-file guuid=0c0743d9-1a00-0000-2172-deef210b0000 pid=2849->guuid=84177b1b-1b00-0000-2172-deefa50b0000 pid=2981 execve 85cb166f-c5aa-5d66-976c-4b45cd0248d7 139.162.143.187:80 guuid=83a9b8d9-1a00-0000-2172-deef220b0000 pid=2850->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 91B guuid=1dea29ea-1a00-0000-2172-deef330b0000 pid=2867->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 92B guuid=916e94ee-1a00-0000-2172-deef380b0000 pid=2872->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 92B guuid=d10862f7-1a00-0000-2172-deef450b0000 pid=2885->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 92B guuid=19609efa-1a00-0000-2172-deef4e0b0000 pid=2894->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 92B guuid=f204a3fd-1a00-0000-2172-deef5a0b0000 pid=2906->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 92B guuid=3b76ba00-1b00-0000-2172-deef670b0000 pid=2919->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 92B guuid=6c5f4304-1b00-0000-2172-deef750b0000 pid=2933->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 91B guuid=df765407-1b00-0000-2172-deef7b0b0000 pid=2939->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 91B guuid=8a7dd30b-1b00-0000-2172-deef880b0000 pid=2952->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 91B guuid=3da4150f-1b00-0000-2172-deef900b0000 pid=2960->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 91B guuid=2d829a15-1b00-0000-2172-deef990b0000 pid=2969->85cb166f-c5aa-5d66-976c-4b45cd0248d7 send: 94B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-10-02 05:49:28 UTC
File Type:
Text (Shell)
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 56d6145255aea2570b3ad679c840162d0c2aca2483174f08f69d6515dca97202

(this sample)

  
Delivery method
Distributed via web download

Comments