MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5bf11d8ac58c15af8d5d158dbd61a8a59abfd587f3b4a6df6e5f0f22a6c9af9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5bf11d8ac58c15af8d5d158dbd61a8a59abfd587f3b4a6df6e5f0f22a6c9af9a
SHA3-384 hash: 546655820c371ae5003c0200312946e4da5f39c29aea3efe1b73bea619c7f0256e1768d0c3669f49ba355de02ef2929e
SHA1 hash: b2a184f35843d730a972a2bc026076f6acee7382
MD5 hash: 6aaca914fbe458dda85b751bc8290beb
humanhash: solar-network-floor-fish
File name:wg.sh
Download: download sample
Signature Gafgyt
File size:250 bytes
First seen:2025-08-28 07:33:15 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:9wqAji6c5cKfGeuAji6c56FX4fGeuAji6c54FI33fGe3:9wvi6cbfJri6cU54fJri6cCI33fJ3
TLSH T149D012DC0524E979CC55D48A7663C829980D85B4347507547E8E06748D9D25DB0189C9
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://185.121.13.159/lol.mips3049d067ddff160a19a588c27e1eafb2914f7964c82f9205db35c5c97a954af3 Gafgytelf gafgyt ua-wget
http://185.121.13.159/lol.arm5d42c76a9dd05e0e00561b9dec3aa16042cafd56cce474322d2e9ae8cf3cb63b3 Miraielf mirai ua-wget
http://185.121.13.159/lol.arm7e3e3ae079060ff2a17c1f535550e1004d6d505190947ed09e887eb3f6e578713 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=f1ba6fd2-1700-0000-a639-afa40b0c0000 pid=3083 /usr/bin/sudo guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092 /tmp/sample.bin guuid=f1ba6fd2-1700-0000-a639-afa40b0c0000 pid=3083->guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092 execve guuid=82edd0d4-1700-0000-a639-afa4150c0000 pid=3093 /usr/bin/rm guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=82edd0d4-1700-0000-a639-afa4150c0000 pid=3093 execve guuid=5d9454d5-1700-0000-a639-afa4170c0000 pid=3095 /usr/bin/wget net send-data write-file guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=5d9454d5-1700-0000-a639-afa4170c0000 pid=3095 execve guuid=af07f0dd-1700-0000-a639-afa4320c0000 pid=3122 /usr/bin/chmod guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=af07f0dd-1700-0000-a639-afa4320c0000 pid=3122 execve guuid=767422de-1700-0000-a639-afa4340c0000 pid=3124 /usr/bin/dash guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=767422de-1700-0000-a639-afa4340c0000 pid=3124 clone guuid=6e79a8de-1700-0000-a639-afa4380c0000 pid=3128 /usr/bin/rm delete-file guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=6e79a8de-1700-0000-a639-afa4380c0000 pid=3128 execve guuid=b677e6de-1700-0000-a639-afa43a0c0000 pid=3130 /usr/bin/wget net send-data write-file guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=b677e6de-1700-0000-a639-afa43a0c0000 pid=3130 execve guuid=400c4ee5-1700-0000-a639-afa44e0c0000 pid=3150 /usr/bin/chmod guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=400c4ee5-1700-0000-a639-afa44e0c0000 pid=3150 execve guuid=126187e5-1700-0000-a639-afa4500c0000 pid=3152 /usr/bin/dash guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=126187e5-1700-0000-a639-afa4500c0000 pid=3152 clone guuid=46bff9e5-1700-0000-a639-afa4540c0000 pid=3156 /usr/bin/rm delete-file guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=46bff9e5-1700-0000-a639-afa4540c0000 pid=3156 execve guuid=f05149e6-1700-0000-a639-afa4550c0000 pid=3157 /usr/bin/wget net send-data write-file guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=f05149e6-1700-0000-a639-afa4550c0000 pid=3157 execve guuid=98f676ee-1700-0000-a639-afa4640c0000 pid=3172 /usr/bin/chmod guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=98f676ee-1700-0000-a639-afa4640c0000 pid=3172 execve guuid=601d30ef-1700-0000-a639-afa4660c0000 pid=3174 /usr/bin/dash guuid=0b2b77d4-1700-0000-a639-afa4140c0000 pid=3092->guuid=601d30ef-1700-0000-a639-afa4660c0000 pid=3174 clone 46c5cf3c-ed7d-558b-b835-3a135f52a779 185.121.13.159:80 guuid=5d9454d5-1700-0000-a639-afa4170c0000 pid=3095->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 137B guuid=b677e6de-1700-0000-a639-afa43a0c0000 pid=3130->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 137B guuid=f05149e6-1700-0000-a639-afa4550c0000 pid=3157->46c5cf3c-ed7d-558b-b835-3a135f52a779 send: 137B
Threat name:
Document-HTML.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-08-28 06:37:00 UTC
File Type:
Text (Shell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh 5bf11d8ac58c15af8d5d158dbd61a8a59abfd587f3b4a6df6e5f0f22a6c9af9a

(this sample)

  
Delivery method
Distributed via web download

Comments