MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a9e190994f75b7b2aea999b99674b344b064f4c87279729e76d3dbdd4d322e60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ngioweb


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: a9e190994f75b7b2aea999b99674b344b064f4c87279729e76d3dbdd4d322e60
SHA3-384 hash: 895dd0a2d58c8984cbcc1cd63f7b7b3ceaf7940377591f8cb51915e86578b68f107055d2371aa672e4257a5218ec03fe
SHA1 hash: c8d2eef0c9cc9d8826c5faead15f4d595775ce11
MD5 hash: 504d3683310be2370696c41255134948
humanhash: low-delta-avocado-montana
File name:dvr.tvt-rep.sh
Download: download sample
Signature Ngioweb
File size:784 bytes
First seen:2025-11-08 11:23:59 UTC
Last seen:2025-11-09 07:15:38 UTC
File type: sh
MIME type:text/plain
ssdeep 12:78CBkE55CvE55CQE55CqE55CXhE55CiE55C7bLE55C7kLE5b:pNa8aja5a6ahavAa4Ax
TLSH T1DC01444DB73187A4C158D6223F70E932E62D8292D4F03B2852C95DB5C0EEE0CBB42E26
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://87.121.84.80/frost.armv7d0ca62e68e235aca958e3877ae7ed505c5667207c95d34907bc806e5ffa0b21b Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.armv6f08d8c43beedbc8d45ea133b44dd09e13d80d725846eac7615141dee9064907e Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.armv5966770e3938bb350119a960948a15421d9c6e0944c4d49f5aa631d3bd9fee703 Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.mipsn/an/aelf geofenced ua-wget USA
http://87.121.84.80/frost.mipsel8758eddd99d34eae170f69fe5c58231a546fef0f56a7e30eefac59ef10ca906b Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.aarch647997eca9041eb31e0264e9273d28e3b672f6f6cb206919ea1167610cfa601f93 Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.x86296d6af5b711aada05ec72d517af8b677c32d4f894fda2934ad5289b7f671619 Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.x86_64a85c562d0b13602adfad63635f895ba1fcd8f4780121f7f98febc10fbfba1819 Miraielf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
2
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-11-08T09:32:00Z UTC
Last seen:
2025-11-09T01:27:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=ade27e1a-1900-0000-6b44-bb3e8d0b0000 pid=2957 /usr/bin/sudo guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964 /tmp/sample.bin guuid=ade27e1a-1900-0000-6b44-bb3e8d0b0000 pid=2957->guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964 execve guuid=0fd92e1e-1900-0000-6b44-bb3e960b0000 pid=2966 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=0fd92e1e-1900-0000-6b44-bb3e960b0000 pid=2966 execve guuid=ddc2cc27-1900-0000-6b44-bb3eaa0b0000 pid=2986 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=ddc2cc27-1900-0000-6b44-bb3eaa0b0000 pid=2986 execve guuid=e4434d28-1900-0000-6b44-bb3eab0b0000 pid=2987 /usr/bin/dash guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=e4434d28-1900-0000-6b44-bb3eab0b0000 pid=2987 clone guuid=ae5b3229-1900-0000-6b44-bb3eaf0b0000 pid=2991 /usr/bin/rm delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=ae5b3229-1900-0000-6b44-bb3eaf0b0000 pid=2991 execve guuid=412b8129-1900-0000-6b44-bb3eb10b0000 pid=2993 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=412b8129-1900-0000-6b44-bb3eb10b0000 pid=2993 execve guuid=89a25940-1900-0000-6b44-bb3ef50b0000 pid=3061 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=89a25940-1900-0000-6b44-bb3ef50b0000 pid=3061 execve guuid=414bd640-1900-0000-6b44-bb3ef60b0000 pid=3062 /usr/bin/dash guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=414bd640-1900-0000-6b44-bb3ef60b0000 pid=3062 clone guuid=fceabb41-1900-0000-6b44-bb3efc0b0000 pid=3068 /usr/bin/rm delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=fceabb41-1900-0000-6b44-bb3efc0b0000 pid=3068 execve guuid=b0af1f42-1900-0000-6b44-bb3efe0b0000 pid=3070 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=b0af1f42-1900-0000-6b44-bb3efe0b0000 pid=3070 execve guuid=8c41f656-1900-0000-6b44-bb3e3d0c0000 pid=3133 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=8c41f656-1900-0000-6b44-bb3e3d0c0000 pid=3133 execve guuid=bb903257-1900-0000-6b44-bb3e3f0c0000 pid=3135 /usr/bin/dash guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=bb903257-1900-0000-6b44-bb3e3f0c0000 pid=3135 clone guuid=4913b257-1900-0000-6b44-bb3e430c0000 pid=3139 /usr/bin/rm delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=4913b257-1900-0000-6b44-bb3e430c0000 pid=3139 execve guuid=ff97ec57-1900-0000-6b44-bb3e450c0000 pid=3141 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=ff97ec57-1900-0000-6b44-bb3e450c0000 pid=3141 execve guuid=1bcf765e-1900-0000-6b44-bb3e5a0c0000 pid=3162 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=1bcf765e-1900-0000-6b44-bb3e5a0c0000 pid=3162 execve guuid=ba18b25e-1900-0000-6b44-bb3e5c0c0000 pid=3164 /usr/bin/dash guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=ba18b25e-1900-0000-6b44-bb3e5c0c0000 pid=3164 clone guuid=38af2f5f-1900-0000-6b44-bb3e600c0000 pid=3168 /usr/bin/rm delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=38af2f5f-1900-0000-6b44-bb3e600c0000 pid=3168 execve guuid=17b46c5f-1900-0000-6b44-bb3e620c0000 pid=3170 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=17b46c5f-1900-0000-6b44-bb3e620c0000 pid=3170 execve guuid=958a8a78-1900-0000-6b44-bb3e7b0c0000 pid=3195 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=958a8a78-1900-0000-6b44-bb3e7b0c0000 pid=3195 execve guuid=df78e078-1900-0000-6b44-bb3e7c0c0000 pid=3196 /usr/bin/dash guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=df78e078-1900-0000-6b44-bb3e7c0c0000 pid=3196 clone guuid=b5c29e79-1900-0000-6b44-bb3e7e0c0000 pid=3198 /usr/bin/rm delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=b5c29e79-1900-0000-6b44-bb3e7e0c0000 pid=3198 execve guuid=76c5f079-1900-0000-6b44-bb3e7f0c0000 pid=3199 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=76c5f079-1900-0000-6b44-bb3e7f0c0000 pid=3199 execve guuid=5d04557f-1900-0000-6b44-bb3e8a0c0000 pid=3210 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=5d04557f-1900-0000-6b44-bb3e8a0c0000 pid=3210 execve guuid=504e907f-1900-0000-6b44-bb3e8c0c0000 pid=3212 /usr/bin/dash guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=504e907f-1900-0000-6b44-bb3e8c0c0000 pid=3212 clone guuid=9c9b1980-1900-0000-6b44-bb3e8f0c0000 pid=3215 /usr/bin/rm delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=9c9b1980-1900-0000-6b44-bb3e8f0c0000 pid=3215 execve guuid=a04a5b80-1900-0000-6b44-bb3e910c0000 pid=3217 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=a04a5b80-1900-0000-6b44-bb3e910c0000 pid=3217 execve guuid=5555bc8a-1900-0000-6b44-bb3ea70c0000 pid=3239 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=5555bc8a-1900-0000-6b44-bb3ea70c0000 pid=3239 execve guuid=dbf6168b-1900-0000-6b44-bb3ea90c0000 pid=3241 /tmp/wqki delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=dbf6168b-1900-0000-6b44-bb3ea90c0000 pid=3241 execve guuid=74c83d8b-1900-0000-6b44-bb3eab0c0000 pid=3243 /usr/bin/rm guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=74c83d8b-1900-0000-6b44-bb3eab0c0000 pid=3243 execve guuid=dc52b28b-1900-0000-6b44-bb3ead0c0000 pid=3245 /usr/bin/wget net send-data write-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=dc52b28b-1900-0000-6b44-bb3ead0c0000 pid=3245 execve guuid=3d7cd4ab-1900-0000-6b44-bb3ec30c0000 pid=3267 /usr/bin/chmod guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=3d7cd4ab-1900-0000-6b44-bb3ec30c0000 pid=3267 execve guuid=42f243ac-1900-0000-6b44-bb3ec40c0000 pid=3268 /tmp/wqki delete-file guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=42f243ac-1900-0000-6b44-bb3ec40c0000 pid=3268 execve guuid=d17e63ac-1900-0000-6b44-bb3ec60c0000 pid=3270 /usr/bin/rm guuid=d358ac1d-1900-0000-6b44-bb3e940b0000 pid=2964->guuid=d17e63ac-1900-0000-6b44-bb3ec60c0000 pid=3270 execve 8a0fa304-c855-5f37-833d-84ef77e0b826 87.121.84.80:80 guuid=0fd92e1e-1900-0000-6b44-bb3e960b0000 pid=2966->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=412b8129-1900-0000-6b44-bb3eb10b0000 pid=2993->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=b0af1f42-1900-0000-6b44-bb3efe0b0000 pid=3070->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=ff97ec57-1900-0000-6b44-bb3e450c0000 pid=3141->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 137B guuid=17b46c5f-1900-0000-6b44-bb3e620c0000 pid=3170->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 139B guuid=76c5f079-1900-0000-6b44-bb3e7f0c0000 pid=3199->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 140B guuid=a04a5b80-1900-0000-6b44-bb3e910c0000 pid=3217->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 136B guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3242 /tmp/wqki net send-data zombie guuid=dbf6168b-1900-0000-6b44-bb3ea90c0000 pid=3241->guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3242 clone 5964582a-537a-5ab9-bea4-3571985c6152 69.5.189.168:5555 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3242->5964582a-537a-5ab9-bea4-3571985c6152 send: 59B ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 208.67.220.220:53 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3242->ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 send: 29B guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330 /tmp/wqki net net-scan send-data zombie guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3242->guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330 clone guuid=dc52b28b-1900-0000-6b44-bb3ead0c0000 pid=3245->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 139B guuid=60ee59ac-1900-0000-6b44-bb3ec50c0000 pid=3269 /tmp/wqki send-data zombie guuid=42f243ac-1900-0000-6b44-bb3ec40c0000 pid=3268->guuid=60ee59ac-1900-0000-6b44-bb3ec50c0000 pid=3269 clone guuid=60ee59ac-1900-0000-6b44-bb3ec50c0000 pid=3269->ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 send: 27B ac570862-0b5b-558b-b43c-fb15134a62c4 114.114.114.114:53 guuid=60ee59ac-1900-0000-6b44-bb3ec50c0000 pid=3269->ac570862-0b5b-558b-b43c-fb15134a62c4 send: 27B 54d92a3b-1447-55af-b534-047898c60c8d 1.1.1.1:53 guuid=60ee59ac-1900-0000-6b44-bb3ec50c0000 pid=3269->54d92a3b-1447-55af-b534-047898c60c8d send: 27B b4bf20d4-f7c8-5c24-8830-c23364537aa4 8.8.4.4:53 guuid=60ee59ac-1900-0000-6b44-bb3ec50c0000 pid=3269->b4bf20d4-f7c8-5c24-8830-c23364537aa4 send: 29B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=60ee59ac-1900-0000-6b44-bb3ec50c0000 pid=3269->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 56B guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 5e14dc12-ad97-50d7-bf3e-07efe913945c 220.80.235.238:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->5e14dc12-ad97-50d7-bf3e-07efe913945c send: 126B 064d79bf-abb6-59e7-9884-905954cdb6e1 52.85.240.234:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->064d79bf-abb6-59e7-9884-905954cdb6e1 send: 124B f9208025-2067-5017-931f-ffbdd032cbb7 36.239.140.105:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->f9208025-2067-5017-931f-ffbdd032cbb7 send: 126B e7f7b519-d1ac-5456-87b7-db7aad312a25 208.109.228.245:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->e7f7b519-d1ac-5456-87b7-db7aad312a25 send: 128B 9e4f97a3-89a0-5a52-9589-6c23f9d77e6a 156.234.64.218:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->9e4f97a3-89a0-5a52-9589-6c23f9d77e6a send: 126B 2e6cac10-0307-5df1-b5fd-173f68424e05 18.144.139.109:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->2e6cac10-0307-5df1-b5fd-173f68424e05 send: 126B 2e980627-2b57-5245-8340-092a59baf68b 34.111.164.199:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->2e980627-2b57-5245-8340-092a59baf68b send: 126B 1ef1e666-e60a-5122-8e4e-00aefd9a6adb 142.58.152.158:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->1ef1e666-e60a-5122-8e4e-00aefd9a6adb send: 126B b11dd499-3bf6-5527-8829-d9cd8f2b388a 166.104.79.213:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->b11dd499-3bf6-5527-8829-d9cd8f2b388a send: 470B f48963e5-0e87-53ce-bde4-e68c7453ad98 34.215.9.218:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->f48963e5-0e87-53ce-bde4-e68c7453ad98 send: 122B f317289e-b548-513d-844b-b6e1a98d79e9 72.14.177.211:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->f317289e-b548-513d-844b-b6e1a98d79e9 send: 124B f91e717d-ada8-5510-b152-27ae19129de7 206.130.101.48:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->f91e717d-ada8-5510-b152-27ae19129de7 send: 126B 61798bcc-f7a6-53d3-86fc-1c36932ff250 52.48.209.242:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->61798bcc-f7a6-53d3-86fc-1c36932ff250 send: 124B eda8b1d6-3fe9-533d-9567-a45269863677 52.187.62.178:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->eda8b1d6-3fe9-533d-9567-a45269863677 send: 124B d03c5ee5-2a41-5eaf-8901-f34c45707808 156.230.241.35:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->d03c5ee5-2a41-5eaf-8901-f34c45707808 send: 126B db663de6-3570-5e98-b2c8-03f9af45f3b4 34.49.43.201:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->db663de6-3570-5e98-b2c8-03f9af45f3b4 send: 122B c078418a-4f30-522e-9c8f-cc7ce2737450 142.34.147.153:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->c078418a-4f30-522e-9c8f-cc7ce2737450 send: 126B d49a56ed-d268-5e11-9792-e386b092bc55 198.20.123.54:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->d49a56ed-d268-5e11-9792-e386b092bc55 send: 124B edcea6f0-2f06-5a0d-9731-5ceb5094893f 72.93.26.65:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->edcea6f0-2f06-5a0d-9731-5ceb5094893f send: 120B 73976685-452e-516b-b222-a2bbd09a6c5a 18.172.96.171:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->73976685-452e-516b-b222-a2bbd09a6c5a send: 124B dbcb764a-56dc-5bc9-a627-4f769fc3597d 18.134.177.250:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->dbcb764a-56dc-5bc9-a627-4f769fc3597d send: 126B 5ceba0e3-f104-58c0-a126-a1b7d5df4880 184.29.204.35:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->5ceba0e3-f104-58c0-a126-a1b7d5df4880 send: 124B 9b7083e6-1ed5-5fa5-b9c8-b44e407fed4a 148.135.134.209:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->9b7083e6-1ed5-5fa5-b9c8-b44e407fed4a send: 128B 1917d3eb-ebe2-516e-8063-5b07f058f93e 78.141.216.196:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->1917d3eb-ebe2-516e-8063-5b07f058f93e send: 126B 37d50097-5abc-5d49-9529-fcb3824746ac 52.216.52.92:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->37d50097-5abc-5d49-9529-fcb3824746ac send: 122B 985c6a32-73c7-579f-bb42-7a533be8769b 34.160.72.209:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->985c6a32-73c7-579f-bb42-7a533be8769b send: 124B 535daf7f-477e-5245-a832-4128ca35e437 34.243.1.116:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->535daf7f-477e-5245-a832-4128ca35e437 send: 122B 53bc9080-1693-5211-aa88-512c8e050e17 56.136.251.58:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->53bc9080-1693-5211-aa88-512c8e050e17 send: 124B 27c2a7a7-9cc2-5f7e-8471-cb6c8f8c075d 142.168.115.167:80 guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->27c2a7a7-9cc2-5f7e-8471-cb6c8f8c075d con guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330|send-data send-data to 4033 IP addresses review logs to see them all guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330->guuid=f941318b-1900-0000-6b44-bb3eaa0c0000 pid=3330|send-data send
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-11-08 11:24:17 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Ngioweb

sh a9e190994f75b7b2aea999b99674b344b064f4c87279729e76d3dbdd4d322e60

(this sample)

  
Delivery method
Distributed via web download

Comments