MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8e87888e8e4cea9a8afacad551c18d2b1ccf0fd763a5f2d3000b5fa8869514d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ngioweb


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: a8e87888e8e4cea9a8afacad551c18d2b1ccf0fd763a5f2d3000b5fa8869514d
SHA3-384 hash: 7074fce1b8c2c3010f0c9a2d7de22b76dd6a73384d8330944e6e46e42a79acb6ab23b3ccb986ca65c8e3b68fce68132a
SHA1 hash: 4f0e510492ff6a120bf7d9392638f51e02401f9a
MD5 hash: 3fef122a4e7c08c8663902126edf7a37
humanhash: tennessee-maryland-foxtrot-mango
File name:dvr.tvt-rep.sh
Download: download sample
Signature Ngioweb
File size:784 bytes
First seen:2025-11-08 07:23:45 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:78CEvpGCnvpGCWvpGC4vpGCXJvpGCgvpGC7bzvpGC7kzvpo:pEhTnhTWhT4hTZhTghTvzhT4zho
TLSH T15101045E242116D0D168F6807871B812DA4AE282D4D0FF3851E81DB7C4EAA98FF17E55
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://87.121.84.80/frost.armv7d0ca62e68e235aca958e3877ae7ed505c5667207c95d34907bc806e5ffa0b21b Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.armv6f08d8c43beedbc8d45ea133b44dd09e13d80d725846eac7615141dee9064907e Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.armv5966770e3938bb350119a960948a15421d9c6e0944c4d49f5aa631d3bd9fee703 Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.mipsn/an/aelf geofenced ua-wget USA
http://87.121.84.80/frost.mipsel8758eddd99d34eae170f69fe5c58231a546fef0f56a7e30eefac59ef10ca906b Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.aarch647997eca9041eb31e0264e9273d28e3b672f6f6cb206919ea1167610cfa601f93 Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.x86296d6af5b711aada05ec72d517af8b677c32d4f894fda2934ad5289b7f671619 Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.x86_64a85c562d0b13602adfad63635f895ba1fcd8f4780121f7f98febc10fbfba1819 Miraielf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-11-08T05:23:00Z UTC
Last seen:
2025-11-08T06:37:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=590ab5e8-1600-0000-39b9-0f133a0e0000 pid=3642 /usr/bin/sudo guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653 /tmp/sample.bin guuid=590ab5e8-1600-0000-39b9-0f133a0e0000 pid=3642->guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653 execve guuid=6988d1ea-1600-0000-39b9-0f13470e0000 pid=3655 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=6988d1ea-1600-0000-39b9-0f13470e0000 pid=3655 execve guuid=7f0a6af2-1600-0000-39b9-0f134a0e0000 pid=3658 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=7f0a6af2-1600-0000-39b9-0f134a0e0000 pid=3658 execve guuid=6b92ecf2-1600-0000-39b9-0f134b0e0000 pid=3659 /usr/bin/dash guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=6b92ecf2-1600-0000-39b9-0f134b0e0000 pid=3659 clone guuid=dbb48ef4-1600-0000-39b9-0f134d0e0000 pid=3661 /usr/bin/rm delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=dbb48ef4-1600-0000-39b9-0f134d0e0000 pid=3661 execve guuid=83e2f3f4-1600-0000-39b9-0f134e0e0000 pid=3662 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=83e2f3f4-1600-0000-39b9-0f134e0e0000 pid=3662 execve guuid=29d3b8fe-1600-0000-39b9-0f13630e0000 pid=3683 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=29d3b8fe-1600-0000-39b9-0f13630e0000 pid=3683 execve guuid=1846f1fe-1600-0000-39b9-0f13650e0000 pid=3685 /usr/bin/dash guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=1846f1fe-1600-0000-39b9-0f13650e0000 pid=3685 clone guuid=04f665ff-1600-0000-39b9-0f13680e0000 pid=3688 /usr/bin/rm delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=04f665ff-1600-0000-39b9-0f13680e0000 pid=3688 execve guuid=0b4d9bff-1600-0000-39b9-0f136a0e0000 pid=3690 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=0b4d9bff-1600-0000-39b9-0f136a0e0000 pid=3690 execve guuid=0cc4de09-1700-0000-39b9-0f13980e0000 pid=3736 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=0cc4de09-1700-0000-39b9-0f13980e0000 pid=3736 execve guuid=54482b0a-1700-0000-39b9-0f139a0e0000 pid=3738 /usr/bin/dash guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=54482b0a-1700-0000-39b9-0f139a0e0000 pid=3738 clone guuid=c54bf00b-1700-0000-39b9-0f13a30e0000 pid=3747 /usr/bin/rm delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=c54bf00b-1700-0000-39b9-0f13a30e0000 pid=3747 execve guuid=85fb240c-1700-0000-39b9-0f13a70e0000 pid=3751 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=85fb240c-1700-0000-39b9-0f13a70e0000 pid=3751 execve guuid=3a62d911-1700-0000-39b9-0f13b70e0000 pid=3767 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=3a62d911-1700-0000-39b9-0f13b70e0000 pid=3767 execve guuid=ca502812-1700-0000-39b9-0f13b90e0000 pid=3769 /usr/bin/dash guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=ca502812-1700-0000-39b9-0f13b90e0000 pid=3769 clone guuid=71d8cf12-1700-0000-39b9-0f13bd0e0000 pid=3773 /usr/bin/rm delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=71d8cf12-1700-0000-39b9-0f13bd0e0000 pid=3773 execve guuid=c0031f13-1700-0000-39b9-0f13bf0e0000 pid=3775 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=c0031f13-1700-0000-39b9-0f13bf0e0000 pid=3775 execve guuid=62074a42-1700-0000-39b9-0f13740f0000 pid=3956 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=62074a42-1700-0000-39b9-0f13740f0000 pid=3956 execve guuid=addb9b42-1700-0000-39b9-0f13750f0000 pid=3957 /usr/bin/dash guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=addb9b42-1700-0000-39b9-0f13750f0000 pid=3957 clone guuid=6f5fac43-1700-0000-39b9-0f13790f0000 pid=3961 /usr/bin/rm delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=6f5fac43-1700-0000-39b9-0f13790f0000 pid=3961 execve guuid=a8900744-1700-0000-39b9-0f137c0f0000 pid=3964 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=a8900744-1700-0000-39b9-0f137c0f0000 pid=3964 execve guuid=1c768855-1700-0000-39b9-0f13a80f0000 pid=4008 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=1c768855-1700-0000-39b9-0f13a80f0000 pid=4008 execve guuid=553af955-1700-0000-39b9-0f13ab0f0000 pid=4011 /usr/bin/dash guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=553af955-1700-0000-39b9-0f13ab0f0000 pid=4011 clone guuid=0147ed56-1700-0000-39b9-0f13ae0f0000 pid=4014 /usr/bin/rm delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=0147ed56-1700-0000-39b9-0f13ae0f0000 pid=4014 execve guuid=03475d57-1700-0000-39b9-0f13b30f0000 pid=4019 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=03475d57-1700-0000-39b9-0f13b30f0000 pid=4019 execve guuid=a3995a61-1700-0000-39b9-0f13cc0f0000 pid=4044 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=a3995a61-1700-0000-39b9-0f13cc0f0000 pid=4044 execve guuid=df35c761-1700-0000-39b9-0f13ce0f0000 pid=4046 /tmp/vvad delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=df35c761-1700-0000-39b9-0f13ce0f0000 pid=4046 execve guuid=9986ed61-1700-0000-39b9-0f13d00f0000 pid=4048 /usr/bin/rm guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=9986ed61-1700-0000-39b9-0f13d00f0000 pid=4048 execve guuid=30376f62-1700-0000-39b9-0f13d40f0000 pid=4052 /usr/bin/wget net send-data write-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=30376f62-1700-0000-39b9-0f13d40f0000 pid=4052 execve guuid=833a2c6b-1700-0000-39b9-0f13ec0f0000 pid=4076 /usr/bin/chmod guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=833a2c6b-1700-0000-39b9-0f13ec0f0000 pid=4076 execve guuid=f6ba826b-1700-0000-39b9-0f13ed0f0000 pid=4077 /tmp/vvad delete-file guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=f6ba826b-1700-0000-39b9-0f13ed0f0000 pid=4077 execve guuid=a267ab6b-1700-0000-39b9-0f13f00f0000 pid=4080 /usr/bin/rm guuid=a3768dea-1600-0000-39b9-0f13450e0000 pid=3653->guuid=a267ab6b-1700-0000-39b9-0f13f00f0000 pid=4080 execve 8a0fa304-c855-5f37-833d-84ef77e0b826 87.121.84.80:80 guuid=6988d1ea-1600-0000-39b9-0f13470e0000 pid=3655->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=83e2f3f4-1600-0000-39b9-0f134e0e0000 pid=3662->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=0b4d9bff-1600-0000-39b9-0f136a0e0000 pid=3690->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=85fb240c-1700-0000-39b9-0f13a70e0000 pid=3751->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 137B guuid=c0031f13-1700-0000-39b9-0f13bf0e0000 pid=3775->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 139B guuid=a8900744-1700-0000-39b9-0f137c0f0000 pid=3964->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 140B guuid=03475d57-1700-0000-39b9-0f13b30f0000 pid=4019->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 136B guuid=c9f2e461-1700-0000-39b9-0f13cf0f0000 pid=4047 /tmp/vvad send-data zombie guuid=df35c761-1700-0000-39b9-0f13ce0f0000 pid=4046->guuid=c9f2e461-1700-0000-39b9-0f13cf0f0000 pid=4047 clone ac570862-0b5b-558b-b43c-fb15134a62c4 114.114.114.114:53 guuid=c9f2e461-1700-0000-39b9-0f13cf0f0000 pid=4047->ac570862-0b5b-558b-b43c-fb15134a62c4 send: 27B b0abba15-9a34-51cb-a2ff-3008f7e59616 208.67.222.222:53 guuid=c9f2e461-1700-0000-39b9-0f13cf0f0000 pid=4047->b0abba15-9a34-51cb-a2ff-3008f7e59616 send: 54B 6a6ce952-23cd-5c51-b461-6ca6a8c64225 1.0.0.1:53 guuid=c9f2e461-1700-0000-39b9-0f13cf0f0000 pid=4047->6a6ce952-23cd-5c51-b461-6ca6a8c64225 send: 27B 74e4e219-c467-5008-a212-50a3f10516d3 114.114.115.115:53 guuid=c9f2e461-1700-0000-39b9-0f13cf0f0000 pid=4047->74e4e219-c467-5008-a212-50a3f10516d3 send: 29B guuid=30376f62-1700-0000-39b9-0f13d40f0000 pid=4052->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 139B guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4078 /tmp/vvad net send-data zombie guuid=f6ba826b-1700-0000-39b9-0f13ed0f0000 pid=4077->guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4078 clone 5964582a-537a-5ab9-bea4-3571985c6152 69.5.189.168:5555 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4078->5964582a-537a-5ab9-bea4-3571985c6152 send: 62B ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 208.67.220.220:53 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4078->ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 send: 27B guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245 /tmp/vvad net net-scan send-data zombie guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4078->guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245 clone 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 8cb242e1-5a10-50ac-a290-696ea1095584 52.192.86.112:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->8cb242e1-5a10-50ac-a290-696ea1095584 send: 124B 27ed84cc-e898-52d8-90b3-7032e9700915 122.10.126.8:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->27ed84cc-e898-52d8-90b3-7032e9700915 send: 614B 0bc2e4d2-b5a6-5103-adf1-bb2664699f03 184.30.92.18:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->0bc2e4d2-b5a6-5103-adf1-bb2664699f03 send: 122B 6c4c2548-4e27-5b86-98e3-8bd11fd21286 184.50.210.121:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->6c4c2548-4e27-5b86-98e3-8bd11fd21286 send: 126B a59a2ca8-b433-5c8b-92ec-85daf1ad6b8a 220.132.8.149:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->a59a2ca8-b433-5c8b-92ec-85daf1ad6b8a send: 124B 1a61b822-4ddf-5860-887c-df0b050368a1 206.238.143.228:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->1a61b822-4ddf-5860-887c-df0b050368a1 send: 128B 433211c9-5ea8-5416-b139-b01bd55e3a97 122.114.158.99:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->433211c9-5ea8-5416-b139-b01bd55e3a97 send: 126B ac6d4216-5c10-51ed-a2aa-f390b618ce89 128.6.158.68:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->ac6d4216-5c10-51ed-a2aa-f390b618ce89 send: 122B c3aeefd9-19e7-5b10-a708-d652832c420c 154.214.100.93:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->c3aeefd9-19e7-5b10-a708-d652832c420c send: 126B dda0785f-111e-5a70-8cf4-1778202b523e 34.107.214.196:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->dda0785f-111e-5a70-8cf4-1778202b523e send: 126B 53d2725b-5e20-57ad-94e9-15bb1e0ae719 52.38.141.168:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->53d2725b-5e20-57ad-94e9-15bb1e0ae719 send: 124B 655bf834-e37b-5c33-a733-07c9e9d836b1 202.238.242.30:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->655bf834-e37b-5c33-a733-07c9e9d836b1 send: 126B cb490b35-3886-50fd-8958-39a79fb87c18 18.140.194.61:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->cb490b35-3886-50fd-8958-39a79fb87c18 send: 124B 922b8b05-1875-575b-8b12-592ba9587bd6 210.125.186.16:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->922b8b05-1875-575b-8b12-592ba9587bd6 send: 126B 96733b47-4594-534d-b395-11be4f2d9581 204.206.13.44:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->96733b47-4594-534d-b395-11be4f2d9581 send: 208B 1abb518a-1a17-5bdb-b61f-c0a4c0f102c7 202.188.130.36:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->1abb518a-1a17-5bdb-b61f-c0a4c0f102c7 send: 126B 620e53f5-36c3-5d9a-8ca5-35a49895b009 154.88.106.10:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->620e53f5-36c3-5d9a-8ca5-35a49895b009 send: 124B 372994f7-9c4b-5fdc-8c76-b1412a3b0473 204.204.154.120:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->372994f7-9c4b-5fdc-8c76-b1412a3b0473 send: 128B 476d29b8-8748-539e-88ab-c3ceae3c78a1 18.64.52.180:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->476d29b8-8748-539e-88ab-c3ceae3c78a1 send: 122B 38d90a95-ba96-59ce-ac61-2283d97341d1 18.173.242.217:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->38d90a95-ba96-59ce-ac61-2283d97341d1 send: 83B 809c15d1-b059-503c-b34f-30ebcb0b4102 34.128.130.235:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->809c15d1-b059-503c-b34f-30ebcb0b4102 send: 126B b59e3d49-fee1-5fa8-9ac2-b93f6c5810aa 182.160.61.92:80 guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->b59e3d49-fee1-5fa8-9ac2-b93f6c5810aa send: 124B guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245|send-data send-data to 4040 IP addresses review logs to see them all guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245->guuid=72d99c6b-1700-0000-39b9-0f13ee0f0000 pid=4245|send-data send
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-11-08 07:24:19 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Ngioweb

sh a8e87888e8e4cea9a8afacad551c18d2b1ccf0fd763a5f2d3000b5fa8869514d

(this sample)

  
Delivery method
Distributed via web download

Comments