MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cef8b3dfbead4b74e244043e3ea8ea45281d58d6601bd839e9a4ed74d5137edc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: cef8b3dfbead4b74e244043e3ea8ea45281d58d6601bd839e9a4ed74d5137edc
SHA3-384 hash: a1691a24c2deb275e2090816f7091b54aed545e61189ad44e8705553646de314c943f88cba9657601a2766a3195968d6
SHA1 hash: 211c87e95846a2fe37eebc130086d3de99fffdca
MD5 hash: 72ee8a1486ffe124c061fb59809f7b9a
humanhash: lamp-orange-carolina-pizza
File name:wget.sh
Download: download sample
File size:943 bytes
First seen:2025-11-22 12:14:55 UTC
Last seen:2025-11-23 11:16:31 UTC
File type: sh
MIME type:text/x-shellscript
ssdeep 12:KSs6wZq4qGNyHe0fq3swqhSYeJB/qWpLqqynqSq3z+M7lnN:KSKZt62sRexppyg66lnN
TLSH T1C11104CE06616A75868CDF0BF5938A6C104D86CD46995BCD3CDD883792C0AE4F904E68
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://196.251.100.22/arme6c563c09c5b0d3ece466e66741c73e24763c901a9511f2664128ba80ee653af Mirai32-bit elf mirai Mozi
http://196.251.100.22/arm507ad16f0878b5af7f123753058da3660d83cac7a6244038fa82a5279ecbcdec7 Miraielf mirai ua-wget
http://196.251.100.22/arm70feffdb13c3bce429c074cf1b5d10a33001b34a4e21d014d5f5151a9d01283f6 Miraielf mirai ua-wget
http://196.251.100.22/mips7496c6976b0e8438ea6f69e103f1af1e6d501a7fe26380914cbfc4010d6cf5b5 Mirai32-bit elf mirai Mozi
http://196.251.100.22/mpsl1e8f3cf5b4d3f882baf522d62bf9fc105fc34ad3562f0d2dca48dad26f5e2b26 Miraielf mirai ua-wget
http://196.251.100.22/arcd633d1ca4811f232d0594a19e7fb1caff2af4de4c229d06a60e0ae31068a5bd6 Miraielf mirai ua-wget
http://196.251.100.22/aarch64f5433635d351bd7e97ec67483b7bbd10618996afac326c6c65cb12bbb7b1a28e Miraielf mirai ua-wget
http://196.251.100.22/powerpcn/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
29
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-11-22T09:38:00Z UTC
Last seen:
2025-11-23T03:47:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=7c169b73-1900-0000-d9b1-a5b5500f0000 pid=3920 /usr/bin/sudo guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929 /tmp/sample.bin guuid=7c169b73-1900-0000-d9b1-a5b5500f0000 pid=3920->guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929 execve guuid=f7fdf075-1900-0000-d9b1-a5b55d0f0000 pid=3933 /usr/bin/rm guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=f7fdf075-1900-0000-d9b1-a5b55d0f0000 pid=3933 execve guuid=d5625276-1900-0000-d9b1-a5b55e0f0000 pid=3934 /usr/bin/rm guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=d5625276-1900-0000-d9b1-a5b55e0f0000 pid=3934 execve guuid=05dead76-1900-0000-d9b1-a5b5600f0000 pid=3936 /usr/bin/rm guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=05dead76-1900-0000-d9b1-a5b5600f0000 pid=3936 execve guuid=bfadf076-1900-0000-d9b1-a5b5610f0000 pid=3937 /usr/bin/rm guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=bfadf076-1900-0000-d9b1-a5b5610f0000 pid=3937 execve guuid=3ed02b77-1900-0000-d9b1-a5b5630f0000 pid=3939 /usr/bin/rm guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=3ed02b77-1900-0000-d9b1-a5b5630f0000 pid=3939 execve guuid=6be96877-1900-0000-d9b1-a5b5650f0000 pid=3941 /usr/bin/rm guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=6be96877-1900-0000-d9b1-a5b5650f0000 pid=3941 execve guuid=1ac19f77-1900-0000-d9b1-a5b5670f0000 pid=3943 /usr/bin/rm guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=1ac19f77-1900-0000-d9b1-a5b5670f0000 pid=3943 execve guuid=7e51d977-1900-0000-d9b1-a5b5690f0000 pid=3945 /usr/bin/cp guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=7e51d977-1900-0000-d9b1-a5b5690f0000 pid=3945 execve guuid=20c0e77c-1900-0000-d9b1-a5b5760f0000 pid=3958 /usr/bin/busybox net send-data write-file guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=20c0e77c-1900-0000-d9b1-a5b5760f0000 pid=3958 execve guuid=aaa32c7f-1900-0000-d9b1-a5b5810f0000 pid=3969 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=aaa32c7f-1900-0000-d9b1-a5b5810f0000 pid=3969 execve guuid=1770657f-1900-0000-d9b1-a5b5830f0000 pid=3971 /usr/bin/dash guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=1770657f-1900-0000-d9b1-a5b5830f0000 pid=3971 clone guuid=f1413b80-1900-0000-d9b1-a5b5880f0000 pid=3976 /usr/bin/busybox net send-data write-file guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=f1413b80-1900-0000-d9b1-a5b5880f0000 pid=3976 execve guuid=90574482-1900-0000-d9b1-a5b58c0f0000 pid=3980 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=90574482-1900-0000-d9b1-a5b58c0f0000 pid=3980 execve guuid=47b88182-1900-0000-d9b1-a5b5900f0000 pid=3984 /usr/bin/dash guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=47b88182-1900-0000-d9b1-a5b5900f0000 pid=3984 clone guuid=dfcc6483-1900-0000-d9b1-a5b5950f0000 pid=3989 /usr/bin/busybox net send-data write-file guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=dfcc6483-1900-0000-d9b1-a5b5950f0000 pid=3989 execve guuid=e9067385-1900-0000-d9b1-a5b59d0f0000 pid=3997 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=e9067385-1900-0000-d9b1-a5b59d0f0000 pid=3997 execve guuid=2971ac85-1900-0000-d9b1-a5b59f0f0000 pid=3999 /usr/bin/dash guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=2971ac85-1900-0000-d9b1-a5b59f0f0000 pid=3999 clone guuid=f0bce486-1900-0000-d9b1-a5b5a70f0000 pid=4007 /usr/bin/busybox net send-data write-file guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=f0bce486-1900-0000-d9b1-a5b5a70f0000 pid=4007 execve guuid=61470989-1900-0000-d9b1-a5b5b10f0000 pid=4017 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=61470989-1900-0000-d9b1-a5b5b10f0000 pid=4017 execve guuid=d9fc4589-1900-0000-d9b1-a5b5b30f0000 pid=4019 /usr/bin/dash guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=d9fc4589-1900-0000-d9b1-a5b5b30f0000 pid=4019 clone guuid=86cc0c8a-1900-0000-d9b1-a5b5b80f0000 pid=4024 /usr/bin/busybox net send-data write-file guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=86cc0c8a-1900-0000-d9b1-a5b5b80f0000 pid=4024 execve guuid=e823648c-1900-0000-d9b1-a5b5c40f0000 pid=4036 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=e823648c-1900-0000-d9b1-a5b5c40f0000 pid=4036 execve guuid=5a079e8c-1900-0000-d9b1-a5b5c60f0000 pid=4038 /usr/bin/dash guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=5a079e8c-1900-0000-d9b1-a5b5c60f0000 pid=4038 clone guuid=0fed3c8d-1900-0000-d9b1-a5b5ca0f0000 pid=4042 /usr/bin/busybox net send-data write-file guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=0fed3c8d-1900-0000-d9b1-a5b5ca0f0000 pid=4042 execve guuid=6e9c628f-1900-0000-d9b1-a5b5d50f0000 pid=4053 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=6e9c628f-1900-0000-d9b1-a5b5d50f0000 pid=4053 execve guuid=2ebe998f-1900-0000-d9b1-a5b5d60f0000 pid=4054 /usr/bin/dash guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=2ebe998f-1900-0000-d9b1-a5b5d60f0000 pid=4054 clone guuid=13cce790-1900-0000-d9b1-a5b5df0f0000 pid=4063 /usr/bin/busybox net send-data write-file guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=13cce790-1900-0000-d9b1-a5b5df0f0000 pid=4063 execve guuid=c4ebf792-1900-0000-d9b1-a5b5e60f0000 pid=4070 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=c4ebf792-1900-0000-d9b1-a5b5e60f0000 pid=4070 execve guuid=a8873693-1900-0000-d9b1-a5b5e80f0000 pid=4072 /usr/bin/dash guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=a8873693-1900-0000-d9b1-a5b5e80f0000 pid=4072 clone guuid=b30fd993-1900-0000-d9b1-a5b5ec0f0000 pid=4076 /usr/bin/busybox net send-data guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=b30fd993-1900-0000-d9b1-a5b5ec0f0000 pid=4076 execve guuid=91c51b95-1900-0000-d9b1-a5b5f20f0000 pid=4082 /usr/bin/chmod guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=91c51b95-1900-0000-d9b1-a5b5f20f0000 pid=4082 execve guuid=f5466895-1900-0000-d9b1-a5b5f60f0000 pid=4086 /home/sandbox/FDVPCV guuid=2399af75-1900-0000-d9b1-a5b5590f0000 pid=3929->guuid=f5466895-1900-0000-d9b1-a5b5f60f0000 pid=4086 execve eaf80363-0b40-5228-99a0-aee4bf7af593 196.251.100.22:80 guuid=20c0e77c-1900-0000-d9b1-a5b5760f0000 pid=3958->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 80B guuid=f1413b80-1900-0000-d9b1-a5b5880f0000 pid=3976->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 81B guuid=dfcc6483-1900-0000-d9b1-a5b5950f0000 pid=3989->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 81B guuid=f0bce486-1900-0000-d9b1-a5b5a70f0000 pid=4007->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 81B guuid=86cc0c8a-1900-0000-d9b1-a5b5b80f0000 pid=4024->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 81B guuid=0fed3c8d-1900-0000-d9b1-a5b5ca0f0000 pid=4042->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 80B guuid=13cce790-1900-0000-d9b1-a5b5df0f0000 pid=4063->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 84B guuid=b30fd993-1900-0000-d9b1-a5b5ec0f0000 pid=4076->eaf80363-0b40-5228-99a0-aee4bf7af593 send: 84B
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-11-22 12:07:43 UTC
File Type:
Text (Shell)
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm credential_access defense_evasion discovery linux
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Checks CPU configuration
Reads process memory
Enumerates running processes
File and Directory Permissions Modification
Deletes system logs
Executes dropped EXE
Renames itself
Unexpected DNS network traffic destination
Contacts a large (33760) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh cef8b3dfbead4b74e244043e3ea8ea45281d58d6601bd839e9a4ed74d5137edc

(this sample)

  
Delivery method
Distributed via web download

Comments