MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1dd050e68d412730ca5409cf90ce273e8f93e5e73cb08770fbe00a1be5def5d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: e1dd050e68d412730ca5409cf90ce273e8f93e5e73cb08770fbe00a1be5def5d
SHA3-384 hash: fbeaf6f27b9b82b36e175fe6a45fa0742242b7f940b2f709f64d9eeb8260ddc572693f7142ecc285cf1326ded319a5b2
SHA1 hash: 1d72a597a39c08fdb30d8ab761fa8a31bde767e6
MD5 hash: 5609e7c3b992bbff08737bdc39135e52
humanhash: vegan-bakerloo-queen-failed
File name:Sakura.sh
Download: download sample
Signature Gafgyt
File size:2'063 bytes
First seen:2025-06-30 11:04:18 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 48:vCd8j1ttQdMfxeAR7ICTRaT6PL1GQUIMYt5a:vCd8j1ttQdMfxeAR7ICTRaT6PBGQUIMr
TLSH T18F4141D790510AF32CD0D87773698480F9E1A29995D65F076DDC3CE64CBEEEC68046CA
Magika shell
Reporter abuse_ch
Tags:gafgyt sh
URLMalware sample (SHA256 hash)SignatureTags
http://38.34.15.2/m-i.p-s.Sakuraea13bba39dde5c7cf26a15447061d0b153d6c3b6f1b0c6684f3df55b6e46b700 Miraibotnet-backend mirai publicsrc
http://38.34.15.2/m-p.s-l.Sakurad836d1d93240cc43ac733dcfc366d114204131635995209840920e7b28916021 Miraigafgyt mirai opendir
http://38.34.15.2/a-r.m-4.Sakura18041126d0a7acd4d15503786777b3de56b2ae10cb23448c7014b453aa2450f5 Miraimirai opendir
http://38.34.15.2/a-r.m-5.Sakurae497492dd5df48d4a4d63aeda5b4838b9d8ff99cf5ac82dadc8dfd479315d879 Miraigafgyt mirai opendir
http://38.34.15.2/a-r.m-6.Sakura6f3dd7405902728a3dccc6d5c8339be8df84718db36d3018f1eb32a4cb532d45 Miraigafgyt mirai opendir
http://38.34.15.2/a-r.m-7.Sakura0f514bd1571c0c23c126069ebcac062a0f1cbd050e0aeb6df118da3af36519b5 Miraigafgyt mirai opendir
http://38.34.15.2/x-8.6-.Sakura09c8874da26ded7492d98d1cd423084a480409432adf6e4dc2e9397aa49dc26c Gafgytgafgyt mirai opendir
http://38.34.15.2/x-3.2-.Sakura618f17563781c551a2bc693f893d2746ba70e0dd080ffa257aeed7de5184fe4e Gafgytgafgyt mirai opendir
http://38.34.15.2/i-5.8-6.Sakura96a7163c60755067b6e12a68c325f6eb09fb75e2745bbe1dbc72d1cdb66e25a2 Miraigafgyt mirai opendir
http://38.34.15.2/i-4.8-6.Sakuran/an/an/a
http://38.34.15.2/p-p.c-.Sakuraa2255b96ffebe6f6b85dd31ea30f1cc51094ca6d3cc7b0f852c17d13ac29d23d Miraimirai opendir
http://38.34.15.2/s-h.4-.Sakura943c58c5acaeea285827b7584b22a1fceb0d8a2fa0fb183673e655dadc965604 Miraigafgyt mirai opendir
http://38.34.15.2/m-6.8-k.Sakura7826fe611769cfa6b4687ed3f8fec7e2d21377ad5936c344f1f461e7e496af0e Miraigafgyt mirai opendir

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
trojandownloader trojware agent
Threat name:
Linux.Downloader.Morila
Status:
Malicious
First seen:
2025-06-30 15:03:15 UTC
AV detection:
16 of 24 (66.67%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:gafgyt botnet credential_access defense_evasion discovery linux persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Reads CPU attributes
Reads system network configuration
Modifies Bash startup script
Creates/modifies environment variables
Enumerates running processes
Modifies systemd
Reads system routing table
Write file to user bin folder
Writes file to system bin folder
File and Directory Permissions Modification
Executes dropped EXE
Modifies Watchdog functionality
OS Credential Dumping
Unexpected DNS network traffic destination
Writes DNS configuration
Detected Gafgyt variant
Gafgyt family
Gafgyt/Bashlite
Malware Config
C2 Extraction:
239.255.255.250:1900
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh e1dd050e68d412730ca5409cf90ce273e8f93e5e73cb08770fbe00a1be5def5d

(this sample)

  
Delivery method
Distributed via web download

Comments