MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6039b90a4c53fbdcdc69be41e0041e737f317ee1e017eff68c9b1bddb83bdaa8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 6039b90a4c53fbdcdc69be41e0041e737f317ee1e017eff68c9b1bddb83bdaa8
SHA3-384 hash: 19d2d00080e968a260dcb68a262e0aed8efece1594c4107f76c4c2aae7faab043d3d1850d6d74160ac7813dc882a2dcf
SHA1 hash: 07cf57e1a5e1e3313364801d7232abe16d761a92
MD5 hash: 54d9fb489d61275838824f249f7a596d
humanhash: spring-seventeen-enemy-cardinal
File name:b
Download: download sample
Signature Gafgyt
File size:927 bytes
First seen:2025-08-30 13:34:52 UTC
Last seen:2025-08-31 08:28:24 UTC
File type: sh
MIME type:text/plain
ssdeep 24:E22IbO5zOt+MB0h0p0mkIVu5kIV2Z15kIV7ckq:EAO5CEA04kIkkIQZfkIikq
TLSH T1061157CF53A58C60D8A469CA76538D14B88DC6D439CBCE8CE6CD4535D499D0431B2F69
Magika txt
Reporter abuse_ch
Tags:gafgyt sh
URLMalware sample (SHA256 hash)SignatureTags
http://158.51.126.131/n/armv5l42aea37337e2b2cc306bf363b15f7f7cf962b87db3b4d4449d7e13e31d8f434e Gafgytelf gafgyt ua-wget
http://158.51.126.131/n/armv7l89e53d182f78499c985edf7e16c4da4d768b090fe685d92f5b7778ff2748f975 Gafgytelf gafgyt ua-wget
http://158.51.126.131/n/mips15c9ec390182a640ee6e36c5ae36f633ea3c76e82a9a0e7b138283c414d15e27 Gafgytelf gafgyt mirai ua-wget
http://158.51.126.131/n/mipselc14f3c5adc33a437a16c0ad651eb6b0e493c6fbcb2ff5d9fd4624666bd4f9034 Gafgytelf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
3
# of downloads :
33
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Verdict:
Malicious
File Type:
ps1
First seen:
2025-08-30T14:27:00Z UTC
Last seen:
2025-08-30T14:27:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=b50f25ce-1900-0000-a573-0a8a670c0000 pid=3175 /usr/bin/sudo guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182 /tmp/sample.bin guuid=b50f25ce-1900-0000-a573-0a8a670c0000 pid=3175->guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182 execve guuid=968eadd1-1900-0000-a573-0a8a700c0000 pid=3184 /usr/bin/dash guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=968eadd1-1900-0000-a573-0a8a700c0000 pid=3184 clone guuid=0f5c10d3-1900-0000-a573-0a8a760c0000 pid=3190 /usr/bin/rm delete-file guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=0f5c10d3-1900-0000-a573-0a8a760c0000 pid=3190 execve guuid=cf8b54d3-1900-0000-a573-0a8a770c0000 pid=3191 /usr/bin/rm delete-file guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=cf8b54d3-1900-0000-a573-0a8a770c0000 pid=3191 execve guuid=8b46a3d3-1900-0000-a573-0a8a780c0000 pid=3192 /usr/bin/rm delete-file guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=8b46a3d3-1900-0000-a573-0a8a780c0000 pid=3192 execve guuid=18b8e6d3-1900-0000-a573-0a8a790c0000 pid=3193 /usr/bin/dash guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=18b8e6d3-1900-0000-a573-0a8a790c0000 pid=3193 clone guuid=d26b87d4-1900-0000-a573-0a8a7d0c0000 pid=3197 /usr/bin/dash guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=d26b87d4-1900-0000-a573-0a8a7d0c0000 pid=3197 clone guuid=c88fcdd4-1900-0000-a573-0a8a800c0000 pid=3200 /usr/bin/dash guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=c88fcdd4-1900-0000-a573-0a8a800c0000 pid=3200 clone guuid=0d172228-1b00-0000-a573-0a8a720e0000 pid=3698 /usr/bin/chmod guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=0d172228-1b00-0000-a573-0a8a720e0000 pid=3698 execve guuid=be730d29-1b00-0000-a573-0a8a740e0000 pid=3700 /usr/bin/dash guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=be730d29-1b00-0000-a573-0a8a740e0000 pid=3700 clone guuid=550a2e2b-1b00-0000-a573-0a8a790e0000 pid=3705 /usr/bin/dash guuid=c0c459d1-1900-0000-a573-0a8a6e0c0000 pid=3182->guuid=550a2e2b-1b00-0000-a573-0a8a790e0000 pid=3705 clone guuid=3e69b7d1-1900-0000-a573-0a8a710c0000 pid=3185 /usr/bin/cat guuid=968eadd1-1900-0000-a573-0a8a700c0000 pid=3184->guuid=3e69b7d1-1900-0000-a573-0a8a710c0000 pid=3185 execve guuid=f843bfd1-1900-0000-a573-0a8a720c0000 pid=3186 /usr/bin/grep guuid=968eadd1-1900-0000-a573-0a8a700c0000 pid=3184->guuid=f843bfd1-1900-0000-a573-0a8a720c0000 pid=3186 execve guuid=bec6c3d1-1900-0000-a573-0a8a730c0000 pid=3187 /usr/bin/grep guuid=968eadd1-1900-0000-a573-0a8a700c0000 pid=3184->guuid=bec6c3d1-1900-0000-a573-0a8a730c0000 pid=3187 execve guuid=4d40c9d1-1900-0000-a573-0a8a740c0000 pid=3188 /usr/bin/grep guuid=968eadd1-1900-0000-a573-0a8a700c0000 pid=3184->guuid=4d40c9d1-1900-0000-a573-0a8a740c0000 pid=3188 execve guuid=c7a9d1d1-1900-0000-a573-0a8a750c0000 pid=3189 /usr/bin/cut guuid=968eadd1-1900-0000-a573-0a8a700c0000 pid=3184->guuid=c7a9d1d1-1900-0000-a573-0a8a750c0000 pid=3189 execve guuid=896cefd3-1900-0000-a573-0a8a7b0c0000 pid=3195 /usr/bin/cp write-file guuid=18b8e6d3-1900-0000-a573-0a8a790c0000 pid=3193->guuid=896cefd3-1900-0000-a573-0a8a7b0c0000 pid=3195 execve guuid=9a248fd4-1900-0000-a573-0a8a7e0c0000 pid=3198 /usr/bin/chmod guuid=d26b87d4-1900-0000-a573-0a8a7d0c0000 pid=3197->guuid=9a248fd4-1900-0000-a573-0a8a7e0c0000 pid=3198 execve guuid=3113d6d4-1900-0000-a573-0a8a810c0000 pid=3201 /usr/bin/wget net send-data write-file guuid=c88fcdd4-1900-0000-a573-0a8a800c0000 pid=3200->guuid=3113d6d4-1900-0000-a573-0a8a810c0000 pid=3201 execve 2beca644-24da-5e18-bc49-c06b8c4a111d 158.51.126.131:80 guuid=3113d6d4-1900-0000-a573-0a8a810c0000 pid=3201->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B guuid=a4493c2b-1b00-0000-a573-0a8a7a0e0000 pid=3706 /usr/bin/wget net send-data write-file guuid=550a2e2b-1b00-0000-a573-0a8a790e0000 pid=3705->guuid=a4493c2b-1b00-0000-a573-0a8a7a0e0000 pid=3706 execve guuid=a4493c2b-1b00-0000-a573-0a8a7a0e0000 pid=3706->2beca644-24da-5e18-bc49-c06b8c4a111d send: 137B
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-08-30 13:39:39 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Modifies registry class
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh 6039b90a4c53fbdcdc69be41e0041e737f317ee1e017eff68c9b1bddb83bdaa8

(this sample)

  
Delivery method
Distributed via web download

Comments