MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc62374e22a0bf799a0d4ce8f76222bb09b39576f184ee761eeb85a6a65e4cbe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: cc62374e22a0bf799a0d4ce8f76222bb09b39576f184ee761eeb85a6a65e4cbe
SHA3-384 hash: e3180fe80dcc6593a16200c6622f56e078ec188ae12c4fbb31353d785b6cdd69bd778485550c55680a52d4af65713cbe
SHA1 hash: 33994ded1a32af4e3b6f3c87a2e5b3ff7b278e68
MD5 hash: 5ed37800ea9f63ee246e71dcbb74f558
humanhash: moon-enemy-purple-tennis
File name:zatoempire.sh
Download: download sample
File size:2'413 bytes
First seen:2026-02-22 14:33:24 UTC
Last seen:2026-02-22 18:30:18 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vWwPoOsWxjoOsWZ8BZjKEoOsWovsCoOsWPHoOsW6roOsWB4VyoOsW7RoOsWM3oOz:vPs4sua2ksw6sqszs4sOsRsQ
TLSH T1B441A5C7375A4A75AD63851F37A98CE4637CE8F5A0E07911A0FC6DE3815BE102985F83
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://45.87.43.237:8088/389242390482/3atoNational.x86n/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.mipsn/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.mpsln/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.arm4n/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.arm5n/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.arm6n/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.arm7n/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.ppcn/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.m68kn/an/aelf ua-wget
http://45.87.43.237:8088/389242390482/3atoNational.sh4n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
61
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Verdict:
Malicious
File Type:
unix shell
Detections:
HEUR:Trojan-Downloader.Shell.Agent.p HEUR:Trojan-Downloader.Shell.Agent.gen HEUR:Trojan-Downloader.Shell.Agent.a
Status:
terminated
Behavior Graph:
%3 guuid=3e077674-1a00-0000-1303-b9160b0c0000 pid=3083 /usr/bin/sudo guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090 /tmp/sample.bin guuid=3e077674-1a00-0000-1303-b9160b0c0000 pid=3083->guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090 execve guuid=291e3878-1a00-0000-1303-b916160c0000 pid=3094 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=291e3878-1a00-0000-1303-b916160c0000 pid=3094 execve guuid=e6ce397d-1a00-0000-1303-b9161f0c0000 pid=3103 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=e6ce397d-1a00-0000-1303-b9161f0c0000 pid=3103 execve guuid=fa3f3f87-1a00-0000-1303-b916330c0000 pid=3123 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=fa3f3f87-1a00-0000-1303-b916330c0000 pid=3123 execve guuid=ad59cc87-1a00-0000-1303-b916350c0000 pid=3125 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=ad59cc87-1a00-0000-1303-b916350c0000 pid=3125 execve guuid=8a612788-1a00-0000-1303-b916370c0000 pid=3127 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=8a612788-1a00-0000-1303-b916370c0000 pid=3127 clone guuid=77201889-1a00-0000-1303-b9163c0c0000 pid=3132 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=77201889-1a00-0000-1303-b9163c0c0000 pid=3132 execve guuid=c344d48b-1a00-0000-1303-b916430c0000 pid=3139 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=c344d48b-1a00-0000-1303-b916430c0000 pid=3139 execve guuid=b7c58790-1a00-0000-1303-b9164e0c0000 pid=3150 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=b7c58790-1a00-0000-1303-b9164e0c0000 pid=3150 execve guuid=edd4d390-1a00-0000-1303-b916500c0000 pid=3152 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=edd4d390-1a00-0000-1303-b916500c0000 pid=3152 execve guuid=8e9e1191-1a00-0000-1303-b916520c0000 pid=3154 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=8e9e1191-1a00-0000-1303-b916520c0000 pid=3154 clone guuid=f2670f92-1a00-0000-1303-b916570c0000 pid=3159 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=f2670f92-1a00-0000-1303-b916570c0000 pid=3159 execve guuid=04f5bf93-1a00-0000-1303-b9165c0c0000 pid=3164 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=04f5bf93-1a00-0000-1303-b9165c0c0000 pid=3164 execve guuid=d05c3597-1a00-0000-1303-b916650c0000 pid=3173 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=d05c3597-1a00-0000-1303-b916650c0000 pid=3173 execve guuid=8ae39f97-1a00-0000-1303-b916680c0000 pid=3176 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=8ae39f97-1a00-0000-1303-b916680c0000 pid=3176 execve guuid=5928e697-1a00-0000-1303-b916690c0000 pid=3177 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=5928e697-1a00-0000-1303-b916690c0000 pid=3177 clone guuid=bc6b9098-1a00-0000-1303-b9166b0c0000 pid=3179 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=bc6b9098-1a00-0000-1303-b9166b0c0000 pid=3179 execve guuid=2d3fcf9a-1a00-0000-1303-b9166c0c0000 pid=3180 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=2d3fcf9a-1a00-0000-1303-b9166c0c0000 pid=3180 execve guuid=6426439e-1a00-0000-1303-b916720c0000 pid=3186 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=6426439e-1a00-0000-1303-b916720c0000 pid=3186 execve guuid=288b8e9e-1a00-0000-1303-b916740c0000 pid=3188 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=288b8e9e-1a00-0000-1303-b916740c0000 pid=3188 execve guuid=6de1d69e-1a00-0000-1303-b916760c0000 pid=3190 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=6de1d69e-1a00-0000-1303-b916760c0000 pid=3190 clone guuid=028d809f-1a00-0000-1303-b916790c0000 pid=3193 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=028d809f-1a00-0000-1303-b916790c0000 pid=3193 execve guuid=1a7ec3a2-1a00-0000-1303-b916800c0000 pid=3200 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=1a7ec3a2-1a00-0000-1303-b916800c0000 pid=3200 execve guuid=f2d109a7-1a00-0000-1303-b916880c0000 pid=3208 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=f2d109a7-1a00-0000-1303-b916880c0000 pid=3208 execve guuid=e1d20da8-1a00-0000-1303-b916890c0000 pid=3209 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=e1d20da8-1a00-0000-1303-b916890c0000 pid=3209 execve guuid=6a917ca8-1a00-0000-1303-b9168a0c0000 pid=3210 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=6a917ca8-1a00-0000-1303-b9168a0c0000 pid=3210 clone guuid=555e6ba9-1a00-0000-1303-b9168c0c0000 pid=3212 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=555e6ba9-1a00-0000-1303-b9168c0c0000 pid=3212 execve guuid=c61849ab-1a00-0000-1303-b9168d0c0000 pid=3213 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=c61849ab-1a00-0000-1303-b9168d0c0000 pid=3213 execve guuid=bd4a28af-1a00-0000-1303-b9168e0c0000 pid=3214 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=bd4a28af-1a00-0000-1303-b9168e0c0000 pid=3214 execve guuid=fd54c0af-1a00-0000-1303-b9168f0c0000 pid=3215 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=fd54c0af-1a00-0000-1303-b9168f0c0000 pid=3215 execve guuid=64ae57b0-1a00-0000-1303-b916900c0000 pid=3216 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=64ae57b0-1a00-0000-1303-b916900c0000 pid=3216 clone guuid=ce7f55b1-1a00-0000-1303-b916920c0000 pid=3218 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=ce7f55b1-1a00-0000-1303-b916920c0000 pid=3218 execve guuid=46a3b8b3-1a00-0000-1303-b916930c0000 pid=3219 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=46a3b8b3-1a00-0000-1303-b916930c0000 pid=3219 execve guuid=fd4b82b7-1a00-0000-1303-b916940c0000 pid=3220 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=fd4b82b7-1a00-0000-1303-b916940c0000 pid=3220 execve guuid=b35c29b8-1a00-0000-1303-b916950c0000 pid=3221 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=b35c29b8-1a00-0000-1303-b916950c0000 pid=3221 execve guuid=607da1b8-1a00-0000-1303-b916960c0000 pid=3222 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=607da1b8-1a00-0000-1303-b916960c0000 pid=3222 clone guuid=b43d89b9-1a00-0000-1303-b916980c0000 pid=3224 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=b43d89b9-1a00-0000-1303-b916980c0000 pid=3224 execve guuid=288c5ebb-1a00-0000-1303-b9169c0c0000 pid=3228 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=288c5ebb-1a00-0000-1303-b9169c0c0000 pid=3228 execve guuid=e25816bf-1a00-0000-1303-b916a60c0000 pid=3238 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=e25816bf-1a00-0000-1303-b916a60c0000 pid=3238 execve guuid=501c81bf-1a00-0000-1303-b916a80c0000 pid=3240 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=501c81bf-1a00-0000-1303-b916a80c0000 pid=3240 execve guuid=186a26c0-1a00-0000-1303-b916ab0c0000 pid=3243 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=186a26c0-1a00-0000-1303-b916ab0c0000 pid=3243 clone guuid=f25c21c2-1a00-0000-1303-b916b10c0000 pid=3249 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=f25c21c2-1a00-0000-1303-b916b10c0000 pid=3249 execve guuid=893bbcc3-1a00-0000-1303-b916b60c0000 pid=3254 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=893bbcc3-1a00-0000-1303-b916b60c0000 pid=3254 execve guuid=7a979dc8-1a00-0000-1303-b916c10c0000 pid=3265 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=7a979dc8-1a00-0000-1303-b916c10c0000 pid=3265 execve guuid=bd7909c9-1a00-0000-1303-b916c40c0000 pid=3268 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=bd7909c9-1a00-0000-1303-b916c40c0000 pid=3268 execve guuid=4dff5ac9-1a00-0000-1303-b916c50c0000 pid=3269 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=4dff5ac9-1a00-0000-1303-b916c50c0000 pid=3269 clone guuid=497e38ca-1a00-0000-1303-b916c80c0000 pid=3272 /usr/bin/wget net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=497e38ca-1a00-0000-1303-b916c80c0000 pid=3272 execve guuid=b31647cc-1a00-0000-1303-b916c90c0000 pid=3273 /usr/bin/curl net guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=b31647cc-1a00-0000-1303-b916c90c0000 pid=3273 execve guuid=44f71fd0-1a00-0000-1303-b916ca0c0000 pid=3274 /usr/bin/cat guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=44f71fd0-1a00-0000-1303-b916ca0c0000 pid=3274 execve guuid=0e4aa2d0-1a00-0000-1303-b916cb0c0000 pid=3275 /usr/bin/chmod guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=0e4aa2d0-1a00-0000-1303-b916cb0c0000 pid=3275 execve guuid=2b6911d1-1a00-0000-1303-b916cc0c0000 pid=3276 /usr/bin/bash guuid=cf8af476-1a00-0000-1303-b916120c0000 pid=3090->guuid=2b6911d1-1a00-0000-1303-b916cc0c0000 pid=3276 clone 01425655-a45c-5075-b52e-425e49f25e85 45.87.43.237:8088 guuid=291e3878-1a00-0000-1303-b916160c0000 pid=3094->01425655-a45c-5075-b52e-425e49f25e85 con guuid=e6ce397d-1a00-0000-1303-b9161f0c0000 pid=3103->01425655-a45c-5075-b52e-425e49f25e85 con guuid=77201889-1a00-0000-1303-b9163c0c0000 pid=3132->01425655-a45c-5075-b52e-425e49f25e85 con guuid=c344d48b-1a00-0000-1303-b916430c0000 pid=3139->01425655-a45c-5075-b52e-425e49f25e85 con guuid=f2670f92-1a00-0000-1303-b916570c0000 pid=3159->01425655-a45c-5075-b52e-425e49f25e85 con guuid=04f5bf93-1a00-0000-1303-b9165c0c0000 pid=3164->01425655-a45c-5075-b52e-425e49f25e85 con guuid=bc6b9098-1a00-0000-1303-b9166b0c0000 pid=3179->01425655-a45c-5075-b52e-425e49f25e85 con guuid=2d3fcf9a-1a00-0000-1303-b9166c0c0000 pid=3180->01425655-a45c-5075-b52e-425e49f25e85 con guuid=028d809f-1a00-0000-1303-b916790c0000 pid=3193->01425655-a45c-5075-b52e-425e49f25e85 con guuid=1a7ec3a2-1a00-0000-1303-b916800c0000 pid=3200->01425655-a45c-5075-b52e-425e49f25e85 con guuid=555e6ba9-1a00-0000-1303-b9168c0c0000 pid=3212->01425655-a45c-5075-b52e-425e49f25e85 con guuid=c61849ab-1a00-0000-1303-b9168d0c0000 pid=3213->01425655-a45c-5075-b52e-425e49f25e85 con guuid=ce7f55b1-1a00-0000-1303-b916920c0000 pid=3218->01425655-a45c-5075-b52e-425e49f25e85 con guuid=46a3b8b3-1a00-0000-1303-b916930c0000 pid=3219->01425655-a45c-5075-b52e-425e49f25e85 con guuid=b43d89b9-1a00-0000-1303-b916980c0000 pid=3224->01425655-a45c-5075-b52e-425e49f25e85 con guuid=288c5ebb-1a00-0000-1303-b9169c0c0000 pid=3228->01425655-a45c-5075-b52e-425e49f25e85 con guuid=f25c21c2-1a00-0000-1303-b916b10c0000 pid=3249->01425655-a45c-5075-b52e-425e49f25e85 con guuid=893bbcc3-1a00-0000-1303-b916b60c0000 pid=3254->01425655-a45c-5075-b52e-425e49f25e85 con guuid=497e38ca-1a00-0000-1303-b916c80c0000 pid=3272->01425655-a45c-5075-b52e-425e49f25e85 con guuid=b31647cc-1a00-0000-1303-b916c90c0000 pid=3273->01425655-a45c-5075-b52e-425e49f25e85 con
Verdict:
Malicious
Threat:
Trojan-Downloader.Shell.Agent
Threat name:
Linux.Downloader.Medusa
Status:
Malicious
First seen:
2026-02-22 15:16:48 UTC
AV detection:
16 of 24 (66.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders
Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh cc62374e22a0bf799a0d4ce8f76222bb09b39576f184ee761eeb85a6a65e4cbe

(this sample)

  
Delivery method
Distributed via web download

Comments