MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a1f7842e77bbf4dde46f9ca25583f687673fe6ce7902457d8b9e2ddc38ee0350. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: a1f7842e77bbf4dde46f9ca25583f687673fe6ce7902457d8b9e2ddc38ee0350
SHA3-384 hash: 7311725840f6d31be664f9e4b9f17c901e0965eea2abda3f5602b989ea746e59ac948be6f9c3c300db972787f6ede6a4
SHA1 hash: 19f361076d4107f3a1eab57ee12775ef3cc0db66
MD5 hash: a13076659a1e4870742fb6dd64b68795
humanhash: bluebird-batman-diet-idaho
File name:faith
Download: download sample
Signature Gafgyt
File size:681 bytes
First seen:2025-09-24 16:55:26 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:dZoJ2egeKNWKDbnPZM5ZMoOF7+MB05+X7uZDkX7HDNk8RGX7ACkX7ARDNk8R9:E22IbO5zOt+MB0DZEk7ky
TLSH T1DC0126CE01B19C2158D64DEB75674D2968CAC6E52EC38EC470CF0676F8CCD15B271E9A
Magika shell
Reporter abuse_ch
Tags:gafgyt sh
URLMalware sample (SHA256 hash)SignatureTags
http://194.31.222.17/a/mips8e238f56f35679d593b390b3da74430b0e990c71c0ed9916a3cd8b2a8ba65fc1 Gafgyt32-bit DEU elf gafgyt geofenced Mozi opendir
http://194.31.222.17/a/mipsel0e8d3a402c7c26934f806238bc7c74e1768121baa011838f61c0c040ffa700c8 Gafgyt32-bit DEU elf gafgyt geofenced Mozi opendir

Intelligence


File Origin
# of uploads :
1
# of downloads :
42
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Verdict:
Malicious
File Type:
ps1
First seen:
2025-09-24T15:07:00Z UTC
Last seen:
2025-09-24T15:07:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p
Status:
terminated
Behavior Graph:
%3 guuid=66bc8d50-1a00-0000-3c0e-8bb7e8090000 pid=2536 /usr/bin/sudo guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544 /tmp/sample.bin guuid=66bc8d50-1a00-0000-3c0e-8bb7e8090000 pid=2536->guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544 execve guuid=493a1753-1a00-0000-3c0e-8bb7f2090000 pid=2546 /usr/bin/dash guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=493a1753-1a00-0000-3c0e-8bb7f2090000 pid=2546 clone guuid=504bcc54-1a00-0000-3c0e-8bb7fa090000 pid=2554 /usr/bin/rm delete-file guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=504bcc54-1a00-0000-3c0e-8bb7fa090000 pid=2554 execve guuid=7a912955-1a00-0000-3c0e-8bb7fb090000 pid=2555 /usr/bin/rm delete-file guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=7a912955-1a00-0000-3c0e-8bb7fb090000 pid=2555 execve guuid=1c067255-1a00-0000-3c0e-8bb7fd090000 pid=2557 /usr/bin/rm delete-file guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=1c067255-1a00-0000-3c0e-8bb7fd090000 pid=2557 execve guuid=6331be55-1a00-0000-3c0e-8bb7fe090000 pid=2558 /usr/bin/dash guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=6331be55-1a00-0000-3c0e-8bb7fe090000 pid=2558 clone guuid=5092be57-1a00-0000-3c0e-8bb7010a0000 pid=2561 /usr/bin/dash guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=5092be57-1a00-0000-3c0e-8bb7010a0000 pid=2561 clone guuid=76053658-1a00-0000-3c0e-8bb7050a0000 pid=2565 /usr/bin/dash guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=76053658-1a00-0000-3c0e-8bb7050a0000 pid=2565 clone guuid=f7924968-1a00-0000-3c0e-8bb72f0a0000 pid=2607 /usr/bin/chmod guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=f7924968-1a00-0000-3c0e-8bb72f0a0000 pid=2607 execve guuid=50239968-1a00-0000-3c0e-8bb7300a0000 pid=2608 /usr/bin/dash guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=50239968-1a00-0000-3c0e-8bb7300a0000 pid=2608 clone guuid=4494e26b-1a00-0000-3c0e-8bb73b0a0000 pid=2619 /usr/bin/dash guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=4494e26b-1a00-0000-3c0e-8bb73b0a0000 pid=2619 clone guuid=d0c80a7a-1a00-0000-3c0e-8bb7620a0000 pid=2658 /usr/bin/chmod guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=d0c80a7a-1a00-0000-3c0e-8bb7620a0000 pid=2658 execve guuid=eeac567a-1a00-0000-3c0e-8bb7640a0000 pid=2660 /usr/bin/dash guuid=12b9b452-1a00-0000-3c0e-8bb7f0090000 pid=2544->guuid=eeac567a-1a00-0000-3c0e-8bb7640a0000 pid=2660 clone guuid=f3a02853-1a00-0000-3c0e-8bb7f3090000 pid=2547 /usr/bin/cat guuid=493a1753-1a00-0000-3c0e-8bb7f2090000 pid=2546->guuid=f3a02853-1a00-0000-3c0e-8bb7f3090000 pid=2547 execve guuid=5c453353-1a00-0000-3c0e-8bb7f4090000 pid=2548 /usr/bin/grep guuid=493a1753-1a00-0000-3c0e-8bb7f2090000 pid=2546->guuid=5c453353-1a00-0000-3c0e-8bb7f4090000 pid=2548 execve guuid=17313a53-1a00-0000-3c0e-8bb7f5090000 pid=2549 /usr/bin/grep guuid=493a1753-1a00-0000-3c0e-8bb7f2090000 pid=2546->guuid=17313a53-1a00-0000-3c0e-8bb7f5090000 pid=2549 execve guuid=47c13d53-1a00-0000-3c0e-8bb7f6090000 pid=2550 /usr/bin/grep guuid=493a1753-1a00-0000-3c0e-8bb7f2090000 pid=2546->guuid=47c13d53-1a00-0000-3c0e-8bb7f6090000 pid=2550 execve guuid=efbe4353-1a00-0000-3c0e-8bb7f7090000 pid=2551 /usr/bin/cut guuid=493a1753-1a00-0000-3c0e-8bb7f2090000 pid=2546->guuid=efbe4353-1a00-0000-3c0e-8bb7f7090000 pid=2551 execve guuid=eeedce55-1a00-0000-3c0e-8bb7ff090000 pid=2559 /usr/bin/cp write-file guuid=6331be55-1a00-0000-3c0e-8bb7fe090000 pid=2558->guuid=eeedce55-1a00-0000-3c0e-8bb7ff090000 pid=2559 execve guuid=4278c757-1a00-0000-3c0e-8bb7020a0000 pid=2562 /usr/bin/chmod guuid=5092be57-1a00-0000-3c0e-8bb7010a0000 pid=2561->guuid=4278c757-1a00-0000-3c0e-8bb7020a0000 pid=2562 execve guuid=d26d4058-1a00-0000-3c0e-8bb7060a0000 pid=2566 /usr/bin/wget net send-data write-file guuid=76053658-1a00-0000-3c0e-8bb7050a0000 pid=2565->guuid=d26d4058-1a00-0000-3c0e-8bb7060a0000 pid=2566 execve 287749b9-1937-53b1-8818-44b73ae22708 194.31.222.17:80 guuid=d26d4058-1a00-0000-3c0e-8bb7060a0000 pid=2566->287749b9-1937-53b1-8818-44b73ae22708 send: 134B guuid=e365006c-1a00-0000-3c0e-8bb73c0a0000 pid=2620 /usr/bin/wget net send-data write-file guuid=4494e26b-1a00-0000-3c0e-8bb73b0a0000 pid=2619->guuid=e365006c-1a00-0000-3c0e-8bb73c0a0000 pid=2620 execve guuid=e365006c-1a00-0000-3c0e-8bb73c0a0000 pid=2620->287749b9-1937-53b1-8818-44b73ae22708 send: 136B
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Script-Shell.Trojan.Heuristic
Status:
Malicious
First seen:
2025-09-23 07:15:20 UTC
File Type:
Text (Shell)
AV detection:
8 of 24 (33.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh a1f7842e77bbf4dde46f9ca25583f687673fe6ce7902457d8b9e2ddc38ee0350

(this sample)

  
Delivery method
Distributed via web download

Comments