MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7e5d1704da8e9a79667e4270a0e9c004bda4a3fd8eff03b10ab4ecdc3f29e8a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 7e5d1704da8e9a79667e4270a0e9c004bda4a3fd8eff03b10ab4ecdc3f29e8a9
SHA3-384 hash: 7eb5e168a05d2e73581369670f31039e3f7be6d1391be609e17fa07448133ae5353a3188d074d023512db1e1d7932ca0
SHA1 hash: d96b16fea1c2719b3c5479dcb0a9a592c1edd281
MD5 hash: 599161e66c1fc12760ee9a4031a35b7f
humanhash: may-oregon-mars-tango
File name:sigma.sh
Download: download sample
File size:997 bytes
First seen:2025-10-22 12:59:46 UTC
Last seen:2025-10-23 03:51:52 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 24:uCzH1yGuROUgjHs6E51yGSkVZHIgYyc+scQcOyOWl2:P1ytgS1ymPIgYyTsrfHW2
TLSH T1F611CEFBF2241E72360C8B75F79D6171754A00EF948C3C98A16B48350F1D90872D86B2
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://94.156.152.237:6677/sigma.shn/an/ash ua-wget
http://94.156.152.237:6677/bins/n/an/an/a

Intelligence


File Origin
# of uploads :
2
# of downloads :
43
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-10-22T13:45:00Z UTC
Last seen:
2025-10-22T14:44:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=96f4b4cc-1600-0000-9096-c2bb280e0000 pid=3624 /usr/bin/sudo guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633 /tmp/sample.bin write-config write-file guuid=96f4b4cc-1600-0000-9096-c2bb280e0000 pid=3624->guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633 execve guuid=caa0a2cf-1600-0000-9096-c2bb350e0000 pid=3637 /usr/bin/mkdir guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=caa0a2cf-1600-0000-9096-c2bb350e0000 pid=3637 execve guuid=04a22fd0-1600-0000-9096-c2bb370e0000 pid=3639 /usr/bin/wget net send-data write-file guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=04a22fd0-1600-0000-9096-c2bb370e0000 pid=3639 execve guuid=07e702e4-1600-0000-9096-c2bb550e0000 pid=3669 /usr/bin/chmod guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=07e702e4-1600-0000-9096-c2bb550e0000 pid=3669 execve guuid=959d46e4-1600-0000-9096-c2bb570e0000 pid=3671 /tmp/.cache/x86_64.bin guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=959d46e4-1600-0000-9096-c2bb570e0000 pid=3671 execve guuid=d9d753e4-1600-0000-9096-c2bb580e0000 pid=3672 /usr/bin/sleep guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=d9d753e4-1600-0000-9096-c2bb580e0000 pid=3672 execve guuid=202ce2ea-1600-0000-9096-c2bb640e0000 pid=3684 /usr/bin/wget net send-data write-file guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=202ce2ea-1600-0000-9096-c2bb640e0000 pid=3684 execve guuid=d089f3fc-1600-0000-9096-c2bba50e0000 pid=3749 /usr/bin/chmod guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=d089f3fc-1600-0000-9096-c2bba50e0000 pid=3749 execve guuid=72894afd-1600-0000-9096-c2bba70e0000 pid=3751 /tmp/.cache/i686.bin guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=72894afd-1600-0000-9096-c2bba70e0000 pid=3751 execve guuid=a6be52fd-1600-0000-9096-c2bba80e0000 pid=3752 /usr/bin/sleep guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=a6be52fd-1600-0000-9096-c2bba80e0000 pid=3752 execve guuid=3778d103-1700-0000-9096-c2bbbb0e0000 pid=3771 /usr/bin/wget net send-data guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=3778d103-1700-0000-9096-c2bbbb0e0000 pid=3771 execve guuid=c2b5ed0b-1700-0000-9096-c2bbe30e0000 pid=3811 /usr/bin/chmod guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=c2b5ed0b-1700-0000-9096-c2bbe30e0000 pid=3811 execve guuid=a5ac470c-1700-0000-9096-c2bbe60e0000 pid=3814 /usr/bin/bash guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=a5ac470c-1700-0000-9096-c2bbe60e0000 pid=3814 clone guuid=6431510c-1700-0000-9096-c2bbe70e0000 pid=3815 /usr/bin/sleep guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=6431510c-1700-0000-9096-c2bbe70e0000 pid=3815 execve guuid=e983a912-1700-0000-9096-c2bbfe0e0000 pid=3838 /usr/bin/wget net send-data guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=e983a912-1700-0000-9096-c2bbfe0e0000 pid=3838 execve guuid=ca75a017-1700-0000-9096-c2bb130f0000 pid=3859 /usr/bin/chmod guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=ca75a017-1700-0000-9096-c2bb130f0000 pid=3859 execve guuid=eb35f817-1700-0000-9096-c2bb150f0000 pid=3861 /usr/bin/bash guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=eb35f817-1700-0000-9096-c2bb150f0000 pid=3861 clone guuid=ee510018-1700-0000-9096-c2bb160f0000 pid=3862 /usr/bin/sleep guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=ee510018-1700-0000-9096-c2bb160f0000 pid=3862 execve guuid=4cf1541e-1700-0000-9096-c2bb330f0000 pid=3891 /usr/bin/wget net send-data guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=4cf1541e-1700-0000-9096-c2bb330f0000 pid=3891 execve guuid=3d736e23-1700-0000-9096-c2bb440f0000 pid=3908 /usr/bin/chmod guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=3d736e23-1700-0000-9096-c2bb440f0000 pid=3908 execve guuid=4445e223-1700-0000-9096-c2bb460f0000 pid=3910 /usr/bin/bash guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=4445e223-1700-0000-9096-c2bb460f0000 pid=3910 clone guuid=547aee23-1700-0000-9096-c2bb470f0000 pid=3911 /usr/bin/sleep guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=547aee23-1700-0000-9096-c2bb470f0000 pid=3911 execve guuid=7ed26c2a-1700-0000-9096-c2bb590f0000 pid=3929 /usr/bin/wget net send-data guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=7ed26c2a-1700-0000-9096-c2bb590f0000 pid=3929 execve guuid=efbc1330-1700-0000-9096-c2bb6a0f0000 pid=3946 /usr/bin/chmod guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=efbc1330-1700-0000-9096-c2bb6a0f0000 pid=3946 execve guuid=4a839b30-1700-0000-9096-c2bb6b0f0000 pid=3947 /usr/bin/bash guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=4a839b30-1700-0000-9096-c2bb6b0f0000 pid=3947 clone guuid=f469ad30-1700-0000-9096-c2bb6c0f0000 pid=3948 /usr/bin/sleep guuid=69c234cf-1600-0000-9096-c2bb310e0000 pid=3633->guuid=f469ad30-1700-0000-9096-c2bb6c0f0000 pid=3948 execve a09784c8-3e62-5544-b888-f0de75b68fc5 94.156.152.237:6677 guuid=04a22fd0-1600-0000-9096-c2bb370e0000 pid=3639->a09784c8-3e62-5544-b888-f0de75b68fc5 send: 149B guuid=067e6de4-1600-0000-9096-c2bb590e0000 pid=3673 /tmp/.cache/x86_64.bin net send-data zombie guuid=959d46e4-1600-0000-9096-c2bb570e0000 pid=3671->guuid=067e6de4-1600-0000-9096-c2bb590e0000 pid=3673 clone ec0ce951-1a63-556c-aef8-51857b090af0 94.156.152.237:6678 guuid=067e6de4-1600-0000-9096-c2bb590e0000 pid=3673->ec0ce951-1a63-556c-aef8-51857b090af0 send: 17B guuid=202ce2ea-1600-0000-9096-c2bb640e0000 pid=3684->a09784c8-3e62-5544-b888-f0de75b68fc5 send: 147B guuid=ce7b81fd-1600-0000-9096-c2bbaa0e0000 pid=3754 /tmp/.cache/i686.bin net send-data zombie guuid=72894afd-1600-0000-9096-c2bba70e0000 pid=3751->guuid=ce7b81fd-1600-0000-9096-c2bbaa0e0000 pid=3754 clone guuid=ce7b81fd-1600-0000-9096-c2bbaa0e0000 pid=3754->ec0ce951-1a63-556c-aef8-51857b090af0 send: 17B guuid=3778d103-1700-0000-9096-c2bbbb0e0000 pid=3771->a09784c8-3e62-5544-b888-f0de75b68fc5 send: 147B guuid=e983a912-1700-0000-9096-c2bbfe0e0000 pid=3838->a09784c8-3e62-5544-b888-f0de75b68fc5 send: 150B guuid=4cf1541e-1700-0000-9096-c2bb330f0000 pid=3891->a09784c8-3e62-5544-b888-f0de75b68fc5 send: 147B guuid=7ed26c2a-1700-0000-9096-c2bb590f0000 pid=3929->a09784c8-3e62-5544-b888-f0de75b68fc5 send: 149B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-10-22 13:01:58 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux persistence privilege_escalation
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Modifies Bash startup script
Creates/modifies environment variables
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 7e5d1704da8e9a79667e4270a0e9c004bda4a3fd8eff03b10ab4ecdc3f29e8a9

(this sample)

  
Delivery method
Distributed via web download

Comments