MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4caf78137e6ced7c4dc51149cedb1f8d94c5447d4ccf525e2b785a9904f0c2f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a4caf78137e6ced7c4dc51149cedb1f8d94c5447d4ccf525e2b785a9904f0c2f
SHA3-384 hash: 9e5eeeb80779d5ea67e874a113dbc46e0e7c40a7edd375c28ef7753a749e357f727645c3ed0b2b05272de204e8c8ace8
SHA1 hash: 860dcbc4828e84bb47ac52af56f90a49337b0016
MD5 hash: 2e248349256cfdf07cccacd6582b54a8
humanhash: spaghetti-ink-foxtrot-maryland
File name:w.sh
Download: download sample
File size:1'223 bytes
First seen:2025-09-06 14:44:34 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:FdIdOoWldIdjldIdxNIfldIdAK9ldId6ldIdxldIdLTDk1ldIdo0ldIdTlldId2R:zwfFcpi8SwIl/Vsg
TLSH T19621A4EF337D85105B190AC03076442461CAC7D336989785F36C50727E9DADCBE22E1A
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://41.216.189.108/00101010101001/sora.armn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm5n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm6n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm7n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.m68kn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.mipsn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.mpsln/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.ppcn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.sh4n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora..spcn/an/an/a
http://41.216.189.108//sora.x86n/an/an/a
http://41.216.189.108/00101010101001/sora.x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
ps1
First seen:
2025-09-06T12:02:00Z UTC
Last seen:
2025-09-06T12:02:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.Shell.Agent.cl HEUR:Trojan-Downloader.Shell.Agent.c
Status:
terminated
Behavior Graph:
%3 guuid=27199a53-1800-0000-ecf4-5cfb490a0000 pid=2633 /usr/bin/sudo guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641 /tmp/sample.bin guuid=27199a53-1800-0000-ecf4-5cfb490a0000 pid=2633->guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641 execve guuid=46cb4b57-1800-0000-ecf4-5cfb530a0000 pid=2643 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=46cb4b57-1800-0000-ecf4-5cfb530a0000 pid=2643 execve guuid=e67e5f5a-1800-0000-ecf4-5cfb5c0a0000 pid=2652 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=e67e5f5a-1800-0000-ecf4-5cfb5c0a0000 pid=2652 execve guuid=1902bf5a-1800-0000-ecf4-5cfb5e0a0000 pid=2654 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=1902bf5a-1800-0000-ecf4-5cfb5e0a0000 pid=2654 clone guuid=331bc45a-1800-0000-ecf4-5cfb5f0a0000 pid=2655 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=331bc45a-1800-0000-ecf4-5cfb5f0a0000 pid=2655 execve guuid=7b27615d-1800-0000-ecf4-5cfb660a0000 pid=2662 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=7b27615d-1800-0000-ecf4-5cfb660a0000 pid=2662 execve guuid=62ba045e-1800-0000-ecf4-5cfb680a0000 pid=2664 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=62ba045e-1800-0000-ecf4-5cfb680a0000 pid=2664 clone guuid=ffe8155e-1800-0000-ecf4-5cfb6a0a0000 pid=2666 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=ffe8155e-1800-0000-ecf4-5cfb6a0a0000 pid=2666 execve guuid=ec70cc60-1800-0000-ecf4-5cfb710a0000 pid=2673 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=ec70cc60-1800-0000-ecf4-5cfb710a0000 pid=2673 execve guuid=bada1161-1800-0000-ecf4-5cfb730a0000 pid=2675 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=bada1161-1800-0000-ecf4-5cfb730a0000 pid=2675 clone guuid=1db51961-1800-0000-ecf4-5cfb740a0000 pid=2676 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=1db51961-1800-0000-ecf4-5cfb740a0000 pid=2676 execve guuid=bbce9863-1800-0000-ecf4-5cfb7c0a0000 pid=2684 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=bbce9863-1800-0000-ecf4-5cfb7c0a0000 pid=2684 execve guuid=f25c1164-1800-0000-ecf4-5cfb7e0a0000 pid=2686 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=f25c1164-1800-0000-ecf4-5cfb7e0a0000 pid=2686 clone guuid=4fad1764-1800-0000-ecf4-5cfb7f0a0000 pid=2687 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=4fad1764-1800-0000-ecf4-5cfb7f0a0000 pid=2687 execve guuid=aba5aa66-1800-0000-ecf4-5cfb880a0000 pid=2696 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=aba5aa66-1800-0000-ecf4-5cfb880a0000 pid=2696 execve guuid=b2204767-1800-0000-ecf4-5cfb8b0a0000 pid=2699 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=b2204767-1800-0000-ecf4-5cfb8b0a0000 pid=2699 clone guuid=e2ed5667-1800-0000-ecf4-5cfb8c0a0000 pid=2700 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=e2ed5667-1800-0000-ecf4-5cfb8c0a0000 pid=2700 execve guuid=a22fee69-1800-0000-ecf4-5cfb950a0000 pid=2709 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=a22fee69-1800-0000-ecf4-5cfb950a0000 pid=2709 execve guuid=cf51436a-1800-0000-ecf4-5cfb970a0000 pid=2711 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=cf51436a-1800-0000-ecf4-5cfb970a0000 pid=2711 clone guuid=ca034a6a-1800-0000-ecf4-5cfb980a0000 pid=2712 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=ca034a6a-1800-0000-ecf4-5cfb980a0000 pid=2712 execve guuid=f463de6c-1800-0000-ecf4-5cfba10a0000 pid=2721 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=f463de6c-1800-0000-ecf4-5cfba10a0000 pid=2721 execve guuid=eea61c6d-1800-0000-ecf4-5cfba30a0000 pid=2723 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=eea61c6d-1800-0000-ecf4-5cfba30a0000 pid=2723 clone guuid=496e296d-1800-0000-ecf4-5cfba40a0000 pid=2724 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=496e296d-1800-0000-ecf4-5cfba40a0000 pid=2724 execve guuid=1dfcb86f-1800-0000-ecf4-5cfbac0a0000 pid=2732 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=1dfcb86f-1800-0000-ecf4-5cfbac0a0000 pid=2732 execve guuid=2d830070-1800-0000-ecf4-5cfbaf0a0000 pid=2735 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=2d830070-1800-0000-ecf4-5cfbaf0a0000 pid=2735 clone guuid=e00e0970-1800-0000-ecf4-5cfbb00a0000 pid=2736 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=e00e0970-1800-0000-ecf4-5cfbb00a0000 pid=2736 execve guuid=c4979472-1800-0000-ecf4-5cfbb60a0000 pid=2742 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=c4979472-1800-0000-ecf4-5cfbb60a0000 pid=2742 execve guuid=d95efb72-1800-0000-ecf4-5cfbb70a0000 pid=2743 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=d95efb72-1800-0000-ecf4-5cfbb70a0000 pid=2743 clone guuid=0b040f73-1800-0000-ecf4-5cfbb80a0000 pid=2744 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=0b040f73-1800-0000-ecf4-5cfbb80a0000 pid=2744 execve guuid=211abd75-1800-0000-ecf4-5cfbc10a0000 pid=2753 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=211abd75-1800-0000-ecf4-5cfbc10a0000 pid=2753 execve guuid=84990776-1800-0000-ecf4-5cfbc30a0000 pid=2755 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=84990776-1800-0000-ecf4-5cfbc30a0000 pid=2755 clone guuid=58ae1876-1800-0000-ecf4-5cfbc40a0000 pid=2756 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=58ae1876-1800-0000-ecf4-5cfbc40a0000 pid=2756 execve guuid=7fccd278-1800-0000-ecf4-5cfbc70a0000 pid=2759 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=7fccd278-1800-0000-ecf4-5cfbc70a0000 pid=2759 execve guuid=118d1f79-1800-0000-ecf4-5cfbc80a0000 pid=2760 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=118d1f79-1800-0000-ecf4-5cfbc80a0000 pid=2760 clone guuid=10de2f79-1800-0000-ecf4-5cfbc90a0000 pid=2761 /usr/bin/busybox net send-data guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=10de2f79-1800-0000-ecf4-5cfbc90a0000 pid=2761 execve guuid=38cbfc7b-1800-0000-ecf4-5cfbd10a0000 pid=2769 /usr/bin/chmod guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=38cbfc7b-1800-0000-ecf4-5cfbd10a0000 pid=2769 execve guuid=0485397c-1800-0000-ecf4-5cfbd20a0000 pid=2770 /usr/bin/dash guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=0485397c-1800-0000-ecf4-5cfbd20a0000 pid=2770 clone guuid=9c94497c-1800-0000-ecf4-5cfbd30a0000 pid=2771 /usr/bin/rm guuid=2399d256-1800-0000-ecf4-5cfb510a0000 pid=2641->guuid=9c94497c-1800-0000-ecf4-5cfbd30a0000 pid=2771 execve a4e02df3-c7fa-5be2-b410-afe687812c07 41.216.189.108:80 guuid=46cb4b57-1800-0000-ecf4-5cfb530a0000 pid=2643->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 100B guuid=331bc45a-1800-0000-ecf4-5cfb5f0a0000 pid=2655->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 101B guuid=ffe8155e-1800-0000-ecf4-5cfb6a0a0000 pid=2666->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 101B guuid=1db51961-1800-0000-ecf4-5cfb740a0000 pid=2676->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 101B guuid=4fad1764-1800-0000-ecf4-5cfb7f0a0000 pid=2687->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 101B guuid=e2ed5667-1800-0000-ecf4-5cfb8c0a0000 pid=2700->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 101B guuid=ca034a6a-1800-0000-ecf4-5cfb980a0000 pid=2712->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 101B guuid=496e296d-1800-0000-ecf4-5cfba40a0000 pid=2724->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 100B guuid=e00e0970-1800-0000-ecf4-5cfbb00a0000 pid=2736->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 100B guuid=0b040f73-1800-0000-ecf4-5cfbb80a0000 pid=2744->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 101B guuid=58ae1876-1800-0000-ecf4-5cfbc40a0000 pid=2756->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 86B guuid=10de2f79-1800-0000-ecf4-5cfbc90a0000 pid=2761->a4e02df3-c7fa-5be2-b410-afe687812c07 send: 103B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-09-06 14:48:29 UTC
File Type:
Text (Shell)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh a4caf78137e6ced7c4dc51149cedb1f8d94c5447d4ccf525e2b785a9904f0c2f

(this sample)

  
Delivery method
Distributed via web download

Comments