MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bf584b7fd26baee61a135920c4bb5609b2d19dd7ae16656bacdb96853e7492f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vigorf


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: bf584b7fd26baee61a135920c4bb5609b2d19dd7ae16656bacdb96853e7492f2
SHA3-384 hash: 0515841054706d1bbc678479f1bf1400a7d557edd0f1dd25f436fe48df544af2acd6019393f503ce19341719352d789a
SHA1 hash: e3e7b5fec7526866c0d04fca25115ac8d4cf6a84
MD5 hash: c1438e55cdf6b0dd751def6f19d0b53e
humanhash: carpet-friend-november-foxtrot
File name:wget.sh
Download: download sample
Signature Vigorf
File size:810 bytes
First seen:2025-10-16 05:40:37 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:X0T0XYa0cNI7D0kKz0d+IX0Wjc0uT5W0nl/06t40L/0Aa0Mn:XSkYa4DVQlIX9YL5WgIG/eX
TLSH T1A90112DF66B121B275C4CE64E0658E44982EE3C032514B2FDCCA1CF2C4D9E413B25E69
Magika asm
Reporter abuse_ch
Tags:sh Vigorf
URLMalware sample (SHA256 hash)SignatureTags
http://72.60.107.93/systemcl/arm0aa6fd4f78bcee9f77a93153de85f0db4aa2e42464afcad9564ef46528697d44 Miraielf mirai
http://72.60.107.93/systemcl/arm54b3fafa6af227c69f3164a2b4f85e7024361a714347c7f691099ed80736916ab Miraielf mirai
http://72.60.107.93/systemcl/arm6899c7e47c4e8f921e14bed7dcca677ed995ead6369168433011cac67ef6e5a59 Miraielf mirai
http://72.60.107.93/systemcl/arm7527debaef309134677a1c3a450dc5aea1f3a2a6f742fad86a20c80274c749630 Miraielf mirai
http://72.60.107.93/systemcl/m68kb819a17fd9314f13890dce05291b4c14b40477f0546c7481b4c2af576928244e Miraielf mirai
http://72.60.107.93/systemcl/mipsdc49d000be3daa749c372da39aad50bc49e8d944c7c868fb70b7d15e159d79d3 Miraielf mirai
http://72.60.107.93/systemcl/mpslc5da1b833565988e4bb1729244b07d55ff21148392a7143ff5aab70f43788d6b Miraielf mirai
http://72.60.107.93/systemcl/ppcdcd7d4b917223e33897da06b7fdb676d16aa4d7afc0276bb4525c275b0a45b10 Miraielf mirai
http://72.60.107.93/systemcl/sh4n/an/an/a
http://72.60.107.93/systemcl/spcn/an/an/a
http://72.60.107.93/systemcl/x86d167fe5abe306825e029bd799bb645048ccae15dca31ea4ac9fcb8b416142a3a Miraielf mirai
http://72.60.107.93/systemcl/x86_64d167fe5abe306825e029bd799bb645048ccae15dca31ea4ac9fcb8b416142a3a Miraielf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive
Verdict:
Malicious
File Type:
text
First seen:
2025-10-15T16:28:00Z UTC
Last seen:
2025-10-16T06:34:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=c8f35923-2100-0000-76ea-660eba090000 pid=2490 /usr/bin/sudo guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493 /tmp/sample.bin guuid=c8f35923-2100-0000-76ea-660eba090000 pid=2490->guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493 execve guuid=b3b8da25-2100-0000-76ea-660ebe090000 pid=2494 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=b3b8da25-2100-0000-76ea-660ebe090000 pid=2494 execve guuid=519f0146-2100-0000-76ea-660e030a0000 pid=2563 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=519f0146-2100-0000-76ea-660e030a0000 pid=2563 execve guuid=12904246-2100-0000-76ea-660e050a0000 pid=2565 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=12904246-2100-0000-76ea-660e050a0000 pid=2565 clone guuid=2130d246-2100-0000-76ea-660e090a0000 pid=2569 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=2130d246-2100-0000-76ea-660e090a0000 pid=2569 execve guuid=c4e23066-2100-0000-76ea-660e650a0000 pid=2661 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=c4e23066-2100-0000-76ea-660e650a0000 pid=2661 execve guuid=7f8f7f66-2100-0000-76ea-660e680a0000 pid=2664 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=7f8f7f66-2100-0000-76ea-660e680a0000 pid=2664 clone guuid=04497a67-2100-0000-76ea-660e6c0a0000 pid=2668 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=04497a67-2100-0000-76ea-660e6c0a0000 pid=2668 execve guuid=b2d77f91-2100-0000-76ea-660eba0a0000 pid=2746 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=b2d77f91-2100-0000-76ea-660eba0a0000 pid=2746 execve guuid=a295de91-2100-0000-76ea-660ebb0a0000 pid=2747 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=a295de91-2100-0000-76ea-660ebb0a0000 pid=2747 clone guuid=e81ca592-2100-0000-76ea-660ebf0a0000 pid=2751 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=e81ca592-2100-0000-76ea-660ebf0a0000 pid=2751 execve guuid=d29e32bb-2100-0000-76ea-660e020b0000 pid=2818 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=d29e32bb-2100-0000-76ea-660e020b0000 pid=2818 execve guuid=54d99cbb-2100-0000-76ea-660e040b0000 pid=2820 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=54d99cbb-2100-0000-76ea-660e040b0000 pid=2820 clone guuid=e93d75bc-2100-0000-76ea-660e0a0b0000 pid=2826 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=e93d75bc-2100-0000-76ea-660e0a0b0000 pid=2826 execve guuid=dd7241e4-2100-0000-76ea-660e6c0b0000 pid=2924 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=dd7241e4-2100-0000-76ea-660e6c0b0000 pid=2924 execve guuid=e8f299e4-2100-0000-76ea-660e6d0b0000 pid=2925 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=e8f299e4-2100-0000-76ea-660e6d0b0000 pid=2925 clone guuid=c20452e5-2100-0000-76ea-660e700b0000 pid=2928 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=c20452e5-2100-0000-76ea-660e700b0000 pid=2928 execve guuid=e29a610e-2200-0000-76ea-660ec20b0000 pid=3010 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=e29a610e-2200-0000-76ea-660ec20b0000 pid=3010 execve guuid=6becbd0e-2200-0000-76ea-660ec40b0000 pid=3012 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=6becbd0e-2200-0000-76ea-660ec40b0000 pid=3012 clone guuid=8a916c0f-2200-0000-76ea-660ec80b0000 pid=3016 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=8a916c0f-2200-0000-76ea-660ec80b0000 pid=3016 execve guuid=fa8caf36-2200-0000-76ea-660e2d0c0000 pid=3117 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=fa8caf36-2200-0000-76ea-660e2d0c0000 pid=3117 execve guuid=3437fb36-2200-0000-76ea-660e2f0c0000 pid=3119 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=3437fb36-2200-0000-76ea-660e2f0c0000 pid=3119 clone guuid=0b24ae37-2200-0000-76ea-660e330c0000 pid=3123 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=0b24ae37-2200-0000-76ea-660e330c0000 pid=3123 execve guuid=9720fd56-2200-0000-76ea-660e760c0000 pid=3190 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=9720fd56-2200-0000-76ea-660e760c0000 pid=3190 execve guuid=ad873e57-2200-0000-76ea-660e770c0000 pid=3191 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=ad873e57-2200-0000-76ea-660e770c0000 pid=3191 clone guuid=ac713458-2200-0000-76ea-660e790c0000 pid=3193 /usr/bin/wget net send-data guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=ac713458-2200-0000-76ea-660e790c0000 pid=3193 execve guuid=d70e396e-2200-0000-76ea-660e880c0000 pid=3208 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=d70e396e-2200-0000-76ea-660e880c0000 pid=3208 execve guuid=5fc2a56e-2200-0000-76ea-660e890c0000 pid=3209 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=5fc2a56e-2200-0000-76ea-660e890c0000 pid=3209 clone guuid=e121ba6e-2200-0000-76ea-660e8a0c0000 pid=3210 /usr/bin/wget net send-data guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=e121ba6e-2200-0000-76ea-660e8a0c0000 pid=3210 execve guuid=444f8c83-2200-0000-76ea-660ea50c0000 pid=3237 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=444f8c83-2200-0000-76ea-660ea50c0000 pid=3237 execve guuid=b4b5f283-2200-0000-76ea-660ea60c0000 pid=3238 /usr/bin/dash guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=b4b5f283-2200-0000-76ea-660ea60c0000 pid=3238 clone guuid=2ee10284-2200-0000-76ea-660ea70c0000 pid=3239 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=2ee10284-2200-0000-76ea-660ea70c0000 pid=3239 execve guuid=e7ad0ea4-2200-0000-76ea-660ec00c0000 pid=3264 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=e7ad0ea4-2200-0000-76ea-660ec00c0000 pid=3264 execve guuid=07ca6fa4-2200-0000-76ea-660ec20c0000 pid=3266 /home/sandbox/x86 net guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=07ca6fa4-2200-0000-76ea-660ec20c0000 pid=3266 execve guuid=6c92e4b5-2200-0000-76ea-660ed30c0000 pid=3283 /usr/bin/wget net send-data write-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=6c92e4b5-2200-0000-76ea-660ed30c0000 pid=3283 execve guuid=25468ed6-2200-0000-76ea-660e150d0000 pid=3349 /usr/bin/chmod guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=25468ed6-2200-0000-76ea-660e150d0000 pid=3349 execve guuid=ef4e0cd7-2200-0000-76ea-660e160d0000 pid=3350 /home/sandbox/x86_64 net guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=ef4e0cd7-2200-0000-76ea-660e160d0000 pid=3350 execve guuid=ccfacceb-2200-0000-76ea-660e300d0000 pid=3376 /usr/bin/rm delete-file guuid=49ce9b25-2100-0000-76ea-660ebd090000 pid=2493->guuid=ccfacceb-2200-0000-76ea-660e300d0000 pid=3376 execve 9cc41eb0-d097-5015-ba3b-85bd9aed9e49 72.60.107.93:80 guuid=b3b8da25-2100-0000-76ea-660ebe090000 pid=2494->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 139B guuid=2130d246-2100-0000-76ea-660e090a0000 pid=2569->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 140B guuid=04497a67-2100-0000-76ea-660e6c0a0000 pid=2668->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 140B guuid=e81ca592-2100-0000-76ea-660ebf0a0000 pid=2751->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 140B guuid=e93d75bc-2100-0000-76ea-660e0a0b0000 pid=2826->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 140B guuid=c20452e5-2100-0000-76ea-660e700b0000 pid=2928->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 140B guuid=8a916c0f-2200-0000-76ea-660ec80b0000 pid=3016->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 140B guuid=0b24ae37-2200-0000-76ea-660e330c0000 pid=3123->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 139B guuid=ac713458-2200-0000-76ea-660e790c0000 pid=3193->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 139B guuid=e121ba6e-2200-0000-76ea-660e8a0c0000 pid=3210->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 139B guuid=2ee10284-2200-0000-76ea-660ea70c0000 pid=3239->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 139B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=07ca6fa4-2200-0000-76ea-660ec20c0000 pid=3266->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=e427cfb5-2200-0000-76ea-660ed10c0000 pid=3281 /home/sandbox/x86 guuid=07ca6fa4-2200-0000-76ea-660ec20c0000 pid=3266->guuid=e427cfb5-2200-0000-76ea-660ed10c0000 pid=3281 clone guuid=aec8d8b5-2200-0000-76ea-660ed20c0000 pid=3282 /home/sandbox/x86 net send-data zombie guuid=07ca6fa4-2200-0000-76ea-660ec20c0000 pid=3266->guuid=aec8d8b5-2200-0000-76ea-660ed20c0000 pid=3282 clone guuid=aec8d8b5-2200-0000-76ea-660ed20c0000 pid=3282->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 741d4b50-67cd-5c90-a3da-6fb4b3d62b18 87.121.84.117:61459 guuid=aec8d8b5-2200-0000-76ea-660ed20c0000 pid=3282->741d4b50-67cd-5c90-a3da-6fb4b3d62b18 send: 41B guuid=6c92e4b5-2200-0000-76ea-660ed30c0000 pid=3283->9cc41eb0-d097-5015-ba3b-85bd9aed9e49 send: 142B guuid=ef4e0cd7-2200-0000-76ea-660e160d0000 pid=3350->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=ab65b5eb-2200-0000-76ea-660e2e0d0000 pid=3374 /home/sandbox/x86_64 guuid=ef4e0cd7-2200-0000-76ea-660e160d0000 pid=3350->guuid=ab65b5eb-2200-0000-76ea-660e2e0d0000 pid=3374 clone guuid=62b4bdeb-2200-0000-76ea-660e2f0d0000 pid=3375 /home/sandbox/x86_64 net send-data zombie guuid=ef4e0cd7-2200-0000-76ea-660e160d0000 pid=3350->guuid=62b4bdeb-2200-0000-76ea-660e2f0d0000 pid=3375 clone guuid=62b4bdeb-2200-0000-76ea-660e2f0d0000 pid=3375->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=62b4bdeb-2200-0000-76ea-660e2f0d0000 pid=3375->741d4b50-67cd-5c90-a3da-6fb4b3d62b18 send: 46B
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-10-15 21:53:58 UTC
File Type:
Text (Shell)
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vigorf

sh bf584b7fd26baee61a135920c4bb5609b2d19dd7ae16656bacdb96853e7492f2

(this sample)

  
Delivery method
Distributed via web download

Comments