MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8a64cee16d75da3b3fdf1acf986191aa149d131bba144da437f3b248726a68e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 8a64cee16d75da3b3fdf1acf986191aa149d131bba144da437f3b248726a68e2
SHA3-384 hash: d2ceaf3890ccfa690fbeb0ad3dbc6563d72e48120bbac2f8465a1176459751f4a542b249d1e641d4619b3892931b701c
SHA1 hash: d9e2f111d9eeba544b1d5d5aba22022ae13bd0f8
MD5 hash: f8c3751b21057fda6dd180895f593cda
humanhash: east-winter-single-paris
File name:curl.sh
Download: download sample
File size:691 bytes
First seen:2026-01-20 14:49:56 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KhI5W3CtI1/TbNF7BwBtFgX1npLOhcF626FiliAE/FzqlHWFhoJi5FO3bQA:KOQyS1bbHBn1npLOZwliA2qleoJ1bb
TLSH T17A01D88941483B53D78DCE3F779340AE0321E3C9601BA7D4B1854669A6847C5A868E76
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://91.92.242.42/arm32d8f4119792137a9269a36fb23f84aab73f9a932ad897af6655135102e97409 Miraielf mirai ua-wget
http://91.92.242.42/arm55f139b155ce959a8f2a74f795da448b2a8705f1b00cea3da1ca85b7c977899be Miraielf mirai ua-wget
http://91.92.242.42/arm7c758c08c9126d55348c337ee1b3a6eb90e68e3ffc1ad5ceb9f969faee80b2c0b Miraielf mirai ua-wget
http://91.92.242.42/mipse5c711d405d623a59b267cd234e56b4cbdeb15206b7fc37ed394e64f7762e751 Miraielf mirai ua-wget
http://91.92.242.42/mpslb2495ee300355d0d9e93340929e9a7de0bcffbf95e6aff5b98f09b3f9fe1c7b6 Miraielf mirai ua-wget
http://91.92.242.42/arc376195291aabab3e3bb96a19bd4ada7197cc503f1a2cc43e6ff3a7c45a9e9f83 Miraielf mirai ua-wget
http://91.92.242.42/aarch648e2d51bcd5fdc794dc465645e1997dbe577d8244a7b2a4f40c2757760f50b207 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bash evasive expand lolbin mirai
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-01-17T00:20:00Z UTC
Last seen:
2026-01-20T13:47:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.gen
Status:
terminated
Behavior Graph:
%3 guuid=60691bc5-1800-0000-a85c-6e71ca0a0000 pid=2762 /usr/bin/sudo guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768 /tmp/sample.bin guuid=60691bc5-1800-0000-a85c-6e71ca0a0000 pid=2762->guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768 execve guuid=346588c7-1800-0000-a85c-6e71d20a0000 pid=2770 /usr/bin/rm guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=346588c7-1800-0000-a85c-6e71d20a0000 pid=2770 execve guuid=89ac01c8-1800-0000-a85c-6e71d30a0000 pid=2771 /usr/bin/rm guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=89ac01c8-1800-0000-a85c-6e71d30a0000 pid=2771 execve guuid=b1a283c8-1800-0000-a85c-6e71d40a0000 pid=2772 /usr/bin/rm guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=b1a283c8-1800-0000-a85c-6e71d40a0000 pid=2772 execve guuid=c66902c9-1800-0000-a85c-6e71d60a0000 pid=2774 /usr/bin/rm guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=c66902c9-1800-0000-a85c-6e71d60a0000 pid=2774 execve guuid=d3394cc9-1800-0000-a85c-6e71d70a0000 pid=2775 /usr/bin/rm guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=d3394cc9-1800-0000-a85c-6e71d70a0000 pid=2775 execve guuid=010a9ec9-1800-0000-a85c-6e71d80a0000 pid=2776 /usr/bin/rm guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=010a9ec9-1800-0000-a85c-6e71d80a0000 pid=2776 execve guuid=f259f0c9-1800-0000-a85c-6e71d90a0000 pid=2777 /usr/bin/rm guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=f259f0c9-1800-0000-a85c-6e71d90a0000 pid=2777 execve guuid=0dff3dca-1800-0000-a85c-6e71da0a0000 pid=2778 /usr/bin/curl net send-data write-file guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=0dff3dca-1800-0000-a85c-6e71da0a0000 pid=2778 execve guuid=a8743edf-1800-0000-a85c-6e71f50a0000 pid=2805 /usr/bin/chmod guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=a8743edf-1800-0000-a85c-6e71f50a0000 pid=2805 execve guuid=b3d4abdf-1800-0000-a85c-6e71f70a0000 pid=2807 /usr/bin/dash guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=b3d4abdf-1800-0000-a85c-6e71f70a0000 pid=2807 clone guuid=8ab4b8e0-1800-0000-a85c-6e71fb0a0000 pid=2811 /usr/bin/curl net send-data write-file guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=8ab4b8e0-1800-0000-a85c-6e71fb0a0000 pid=2811 execve guuid=0bfe8df4-1800-0000-a85c-6e71240b0000 pid=2852 /usr/bin/chmod guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=0bfe8df4-1800-0000-a85c-6e71240b0000 pid=2852 execve guuid=f44f1ff5-1800-0000-a85c-6e71250b0000 pid=2853 /usr/bin/dash guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=f44f1ff5-1800-0000-a85c-6e71250b0000 pid=2853 clone guuid=db2db6f5-1800-0000-a85c-6e71280b0000 pid=2856 /usr/bin/curl net send-data write-file guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=db2db6f5-1800-0000-a85c-6e71280b0000 pid=2856 execve guuid=a972e505-1900-0000-a85c-6e71580b0000 pid=2904 /usr/bin/chmod guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=a972e505-1900-0000-a85c-6e71580b0000 pid=2904 execve guuid=6a9e2106-1900-0000-a85c-6e715a0b0000 pid=2906 /usr/bin/dash guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=6a9e2106-1900-0000-a85c-6e715a0b0000 pid=2906 clone guuid=65c29f06-1900-0000-a85c-6e715d0b0000 pid=2909 /usr/bin/curl net send-data write-file guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=65c29f06-1900-0000-a85c-6e715d0b0000 pid=2909 execve guuid=0b504c17-1900-0000-a85c-6e717a0b0000 pid=2938 /usr/bin/chmod guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=0b504c17-1900-0000-a85c-6e717a0b0000 pid=2938 execve guuid=7ffea617-1900-0000-a85c-6e717b0b0000 pid=2939 /usr/bin/dash guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=7ffea617-1900-0000-a85c-6e717b0b0000 pid=2939 clone guuid=715a4718-1900-0000-a85c-6e717d0b0000 pid=2941 /usr/bin/curl net send-data write-file guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=715a4718-1900-0000-a85c-6e717d0b0000 pid=2941 execve guuid=29eeb92a-1900-0000-a85c-6e71930b0000 pid=2963 /usr/bin/chmod guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=29eeb92a-1900-0000-a85c-6e71930b0000 pid=2963 execve guuid=574cf82a-1900-0000-a85c-6e71950b0000 pid=2965 /usr/bin/dash guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=574cf82a-1900-0000-a85c-6e71950b0000 pid=2965 clone guuid=39717c2b-1900-0000-a85c-6e71980b0000 pid=2968 /usr/bin/curl net send-data write-file guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=39717c2b-1900-0000-a85c-6e71980b0000 pid=2968 execve guuid=46dd5e40-1900-0000-a85c-6e71c60b0000 pid=3014 /usr/bin/chmod guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=46dd5e40-1900-0000-a85c-6e71c60b0000 pid=3014 execve guuid=f71aa540-1900-0000-a85c-6e71c70b0000 pid=3015 /usr/bin/dash guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=f71aa540-1900-0000-a85c-6e71c70b0000 pid=3015 clone guuid=08d03841-1900-0000-a85c-6e71ca0b0000 pid=3018 /usr/bin/curl net send-data write-file guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=08d03841-1900-0000-a85c-6e71ca0b0000 pid=3018 execve guuid=a9078555-1900-0000-a85c-6e71fa0b0000 pid=3066 /usr/bin/chmod guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=a9078555-1900-0000-a85c-6e71fa0b0000 pid=3066 execve guuid=3215cb55-1900-0000-a85c-6e71fc0b0000 pid=3068 /usr/bin/dash guuid=0b953ac7-1800-0000-a85c-6e71d00a0000 pid=2768->guuid=3215cb55-1900-0000-a85c-6e71fc0b0000 pid=3068 clone 2cf340ad-1e47-5795-984e-cb0c8020c14e 91.92.242.42:80 guuid=0dff3dca-1800-0000-a85c-6e71da0a0000 pid=2778->2cf340ad-1e47-5795-984e-cb0c8020c14e send: 79B guuid=8ab4b8e0-1800-0000-a85c-6e71fb0a0000 pid=2811->2cf340ad-1e47-5795-984e-cb0c8020c14e send: 80B guuid=db2db6f5-1800-0000-a85c-6e71280b0000 pid=2856->2cf340ad-1e47-5795-984e-cb0c8020c14e send: 80B guuid=65c29f06-1900-0000-a85c-6e715d0b0000 pid=2909->2cf340ad-1e47-5795-984e-cb0c8020c14e send: 80B guuid=715a4718-1900-0000-a85c-6e717d0b0000 pid=2941->2cf340ad-1e47-5795-984e-cb0c8020c14e send: 80B guuid=39717c2b-1900-0000-a85c-6e71980b0000 pid=2968->2cf340ad-1e47-5795-984e-cb0c8020c14e send: 79B guuid=08d03841-1900-0000-a85c-6e71ca0b0000 pid=3018->2cf340ad-1e47-5795-984e-cb0c8020c14e send: 83B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-01-13 22:15:57 UTC
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads system network configuration
Reads process memory
Enumerates active TCP sockets
Enumerates running processes
File and Directory Permissions Modification
Deletes system logs
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (31907) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 8a64cee16d75da3b3fdf1acf986191aa149d131bba144da437f3b248726a68e2

(this sample)

  
Delivery method
Distributed via web download

Comments