MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 84bd8c0aaf2b9fcf2de5e10bb44d4a240a933d6957161f7ca7e1ceaf670799c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 84bd8c0aaf2b9fcf2de5e10bb44d4a240a933d6957161f7ca7e1ceaf670799c5
SHA3-384 hash: b3c77c527a85af0ab1a4bcbe4cfaa9a14f91774d8035303545a7b53777ac763130cc7acb397336128e44f57680ee6667
SHA1 hash: d85b703286be7f971015a6d1aa70a61665b2c7fa
MD5 hash: e5d3723549d7e4c021c62d8393d29fac
humanhash: johnny-quebec-violet-bulldog
File name:g.sh
Download: download sample
Signature Gafgyt
File size:1'001 bytes
First seen:2025-09-23 04:50:56 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:IhfmZt5j+VTn5j+VTW6sIEqSsIEqiEqW5Eqpx:ufmZt5j+VTn5j+VTW6jEqSjEqiEqW5E0
TLSH T18C119BE3890078F0BFCD941279E3E7B9F6A590D33C411DC2CC7CA5A17C90998A968F50
Magika txt
Reporter abuse_ch
Tags:gafgyt sh
URLMalware sample (SHA256 hash)SignatureTags
http://160.250.134.61/lmips8e8239ebc8b41e0cb7f7452f6293f5a5dd4d2f7bd706df0f9e399413e8df328b Gafgytelf gafgyt
http://160.250.134.61/lmpslaea8ad044799f08ef2a9d6bf1617de28d4669ba1fea99f308550af3c87b70349 Gafgytelf gafgyt

Intelligence


File Origin
# of uploads :
1
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-09-23T05:10:00Z UTC
Last seen:
2025-09-23T05:10:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=02688956-1900-0000-9869-2f33da0f0000 pid=4058 /usr/bin/sudo guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066 /tmp/sample.bin guuid=02688956-1900-0000-9869-2f33da0f0000 pid=4058->guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066 execve guuid=3ba17a58-1900-0000-9869-2f33e50f0000 pid=4069 /usr/bin/cp guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=3ba17a58-1900-0000-9869-2f33e50f0000 pid=4069 execve guuid=ec991e5e-1900-0000-9869-2f33f60f0000 pid=4086 /usr/bin/dash guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=ec991e5e-1900-0000-9869-2f33f60f0000 pid=4086 clone guuid=a1133a9a-1900-0000-9869-2f33ef100000 pid=4335 /usr/bin/chmod guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=a1133a9a-1900-0000-9869-2f33ef100000 pid=4335 execve guuid=5254859a-1900-0000-9869-2f33f2100000 pid=4338 /usr/bin/dash guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=5254859a-1900-0000-9869-2f33f2100000 pid=4338 clone guuid=ac62f89b-1900-0000-9869-2f33f9100000 pid=4345 /usr/bin/rm delete-file guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=ac62f89b-1900-0000-9869-2f33f9100000 pid=4345 execve guuid=3516749c-1900-0000-9869-2f33fd100000 pid=4349 /usr/bin/dash guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=3516749c-1900-0000-9869-2f33fd100000 pid=4349 clone guuid=f21251de-1900-0000-9869-2f3389110000 pid=4489 /usr/bin/chmod guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=f21251de-1900-0000-9869-2f3389110000 pid=4489 execve guuid=1d12c3de-1900-0000-9869-2f338b110000 pid=4491 /usr/bin/dash guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=1d12c3de-1900-0000-9869-2f338b110000 pid=4491 clone guuid=034d02e0-1900-0000-9869-2f3390110000 pid=4496 /usr/bin/rm delete-file guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=034d02e0-1900-0000-9869-2f3390110000 pid=4496 execve guuid=6b1885e0-1900-0000-9869-2f3391110000 pid=4497 /usr/bin/rm delete-file guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=6b1885e0-1900-0000-9869-2f3391110000 pid=4497 execve guuid=a66503e1-1900-0000-9869-2f3393110000 pid=4499 /usr/sbin/xtables-nft-multi guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=a66503e1-1900-0000-9869-2f3393110000 pid=4499 execve guuid=ac431eeb-1900-0000-9869-2f33ac110000 pid=4524 /usr/sbin/xtables-nft-multi guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=ac431eeb-1900-0000-9869-2f33ac110000 pid=4524 execve guuid=3bc6f2f1-1900-0000-9869-2f33bc110000 pid=4540 /usr/sbin/xtables-nft-multi guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=3bc6f2f1-1900-0000-9869-2f33bc110000 pid=4540 execve guuid=af3587f2-1900-0000-9869-2f33bf110000 pid=4543 /usr/sbin/xtables-nft-multi guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=af3587f2-1900-0000-9869-2f33bf110000 pid=4543 execve guuid=291f22f3-1900-0000-9869-2f33c2110000 pid=4546 /usr/sbin/xtables-nft-multi guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=291f22f3-1900-0000-9869-2f33c2110000 pid=4546 execve guuid=dc685ffc-1900-0000-9869-2f33df110000 pid=4575 /usr/sbin/xtables-nft-multi guuid=1c2f3558-1900-0000-9869-2f33e20f0000 pid=4066->guuid=dc685ffc-1900-0000-9869-2f33df110000 pid=4575 execve guuid=9a932b5e-1900-0000-9869-2f33f70f0000 pid=4087 /usr/bin/busybox net send-data write-file guuid=ec991e5e-1900-0000-9869-2f33f60f0000 pid=4086->guuid=9a932b5e-1900-0000-9869-2f33f70f0000 pid=4087 execve 0dc21e74-2c96-5836-aca6-ed80e44c888b 160.250.134.61:80 guuid=9a932b5e-1900-0000-9869-2f33f70f0000 pid=4087->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 82B guuid=5fb6809c-1900-0000-9869-2f33fe100000 pid=4350 /usr/bin/busybox net send-data write-file guuid=3516749c-1900-0000-9869-2f33fd100000 pid=4349->guuid=5fb6809c-1900-0000-9869-2f33fe100000 pid=4350 execve guuid=5fb6809c-1900-0000-9869-2f33fe100000 pid=4350->0dc21e74-2c96-5836-aca6-ed80e44c888b send: 82B
Verdict:
Malicious
Threat:
Script-Shell.Downloader.Heuristic
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-09-23 04:33:58 UTC
File Type:
Text (Shell)
AV detection:
7 of 38 (18.42%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh 84bd8c0aaf2b9fcf2de5e10bb44d4a240a933d6957161f7ca7e1ceaf670799c5

(this sample)

  
Delivery method
Distributed via web download

Comments