MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e0478c41f0db6ca3ebfab4395a3cbacf7916dfc17b3ef8bf4a1cd3bac87dfc60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e0478c41f0db6ca3ebfab4395a3cbacf7916dfc17b3ef8bf4a1cd3bac87dfc60
SHA3-384 hash: a6e4eef4732a380726ece32f1b142d7289ec582cfeff616c0a3fe32e6f7a6659dede902e546464bba89897fb2912719a
SHA1 hash: d9cfe8977934c7cf762eb5683010d2a3284b09f0
MD5 hash: 69762b148c5bd84c6acad2333d6638ad
humanhash: missouri-mobile-kitten-black
File name:c.sh
Download: download sample
File size:1'140 bytes
First seen:2025-09-04 09:05:58 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:3J3UdIdvHdIdidIdxNIOdIdAKcdIdbdIdgdIdLTDkUdIdotdIdTkdId1dId95dIk:WnmDg
TLSH T14A215BFE33BD9582AB290A8870765018A1C6C2D377A89781F33C54216D9D2CD6E25B37
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://41.216.189.108/00101010101001/sora.armn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm5n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm6n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.arm7n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.m68kn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.mipsn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.mpsln/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.ppcn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.sh4n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.spcn/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.x86n/an/aelf ua-wget
http://41.216.189.108/00101010101001/sora.x86_64n/an/aelf ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
ps1
First seen:
2025-09-04T06:42:00Z UTC
Last seen:
2025-09-04T06:42:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=b9814372-1b00-0000-6163-7c8fac0c0000 pid=3244 /usr/bin/sudo guuid=ce763e75-1b00-0000-6163-7c8fb10c0000 pid=3249 /tmp/sample.bin guuid=b9814372-1b00-0000-6163-7c8fac0c0000 pid=3244->guuid=ce763e75-1b00-0000-6163-7c8fb10c0000 pid=3249 execve guuid=28af9a75-1b00-0000-6163-7c8fb30c0000 pid=3251 /usr/bin/curl net guuid=ce763e75-1b00-0000-6163-7c8fb10c0000 pid=3249->guuid=28af9a75-1b00-0000-6163-7c8fb30c0000 pid=3251 execve a4e02df3-c7fa-5be2-b410-afe687812c07 41.216.189.108:80 guuid=28af9a75-1b00-0000-6163-7c8fb30c0000 pid=3251->a4e02df3-c7fa-5be2-b410-afe687812c07 con
Threat name:
Linux.Trojan.Vigorf
Status:
Malicious
First seen:
2025-09-04 08:59:22 UTC
File Type:
Text (Shell)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh e0478c41f0db6ca3ebfab4395a3cbacf7916dfc17b3ef8bf4a1cd3bac87dfc60

(this sample)

  
Delivery method
Distributed via web download

Comments