MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf2e415e08962a3723b159e40653f9e85c34d2b29376dddbc280aaaafc5b8118. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: cf2e415e08962a3723b159e40653f9e85c34d2b29376dddbc280aaaafc5b8118
SHA3-384 hash: 2cc1d03ec96810b367f0552e6f18171b1348cf87bddca25d878475de85e40a983131439c50463e4a093d09b90f9b773b
SHA1 hash: 9b9e3e12d62044a9ee0839258f81cc645c887e6c
MD5 hash: f927fd798469794e6170fd18d5ed1182
humanhash: louisiana-johnny-venus-london
File name:sh
Download: download sample
File size:2'083 bytes
First seen:2026-05-17 12:58:59 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vkwvpihneZZn1oBydXrpGHp3tonmzEvJGU6ljiPq2MTCki:vkwYheZZK8rpMp92mzIj6K
TLSH T1594125FAB4A18F30339DC5BC7585254CA757466F491A1EB4F043783C27BC3247174695
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
https://121.176.14.102/n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
24
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-05-16T20:27:00Z UTC
Last seen:
2026-05-18T12:00:00Z UTC
Hits:
~10000
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-05-16 23:48:20 UTC
File Type:
Text (Shell)
AV detection:
12 of 37 (32.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm defense_evasion discovery execution linux persistence privilege_escalation upx
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Reads CPU attributes
Changes its process name
UPX packed file
Reads AppArmor ptrace settings
Attempts to change immutable files
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Enumerates running processes
Reads hardware information
Reads network interface configuration
File and Directory Permissions Modification
Creates Raw socket
Executes dropped EXE
Flushes firewall rules
Contacts a large (666175) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh cf2e415e08962a3723b159e40653f9e85c34d2b29376dddbc280aaaafc5b8118

(this sample)

  
Delivery method
Distributed via web download

Comments