MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e513b052f35bbac9e2678b3197867ee47ec0354c58af44d6c1574633f96de934. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ngioweb


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e513b052f35bbac9e2678b3197867ee47ec0354c58af44d6c1574633f96de934
SHA3-384 hash: e39423187940939c7bb6c91f81838a645d392273f4a51be9614bc1f2eff5f9e9214fcd0735c34e0119be7ee8bf0e652a
SHA1 hash: d409869449cfe7c2e9534c548e60507fc30b73ef
MD5 hash: f65141a8bb9c8cd5018d3a116fe83cff
humanhash: south-purple-ohio-oxygen
File name:router-atemi-rep.sh
Download: download sample
Signature Ngioweb
File size:824 bytes
First seen:2025-11-08 11:43:38 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:7RDV5MjwlCDk5MjwlCDX5MjwlCDR5MjwlCDXO5MjwlCDp5MjwlCD7bo5MjwlCD7l:1nlKulK5lKjlKIlKblKvClK4ClV
TLSH T1D90140BA0CBD65D4A41DD740BCA61887D201E3CFB0ED1B10B37C7D72C0A9A14F0666A6
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://69.5.189.168/frost.armv7ddebe545870ecfe87f0d403a1a1bbf0343c4b9ea4e727e2bdb1915f966658435 Ngiowebelf Ngioweb ua-wget
http://69.5.189.168/frost.armv63f2c0e2becb201a5b2cd23b66deaa39b78fbea6cdc64e539edb442b99f5373d4 Ngiowebelf Ngioweb ua-wget
http://69.5.189.168/frost.armv576e670a4333b77d5f69f0a51440618974bfb545309d57d00e6ca847e85631c86 Ngiowebelf Ngioweb ua-wget
http://69.5.189.168/frost.mips8a9b339fd801c708cb76a8204ccce25fa81d06703371c28f832220426886aaf9 Ngiowebelf ua-wget
http://69.5.189.168/frost.mipselcc5dfc104697e85043a20833fc7928418e8a7321b7b6368b37632fd13b1ec4fa Ngiowebelf mirai Ngioweb ua-wget
http://69.5.189.168/frost.aarch641bb57d84b79bdca142f788f2317f6afa1f8071386ac4febc7529214ed995e964 Ngiowebelf mirai Ngioweb ua-wget
http://69.5.189.168/frost.x86eeac99d3cb2e9e9c6c030c9964afccc0886688a0390a7849994146ac0c9604da Ngiowebelf mirai Ngioweb ua-wget
http://69.5.189.168/frost.x86_6407ddef2fde289218f356264bdf1d4409ffa44168c8e98c03ae3c5015ed62fbb4 Ngiowebelf mirai Ngioweb ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-11-08T10:16:00Z UTC
Last seen:
2025-11-09T01:27:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=acd61407-1a00-0000-976e-3ad4dd090000 pid=2525 /usr/bin/sudo guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532 /tmp/sample.bin guuid=acd61407-1a00-0000-976e-3ad4dd090000 pid=2525->guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532 execve guuid=2356ae09-1a00-0000-976e-3ad4e5090000 pid=2533 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=2356ae09-1a00-0000-976e-3ad4e5090000 pid=2533 execve guuid=ab10d210-1a00-0000-976e-3ad4f7090000 pid=2551 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=ab10d210-1a00-0000-976e-3ad4f7090000 pid=2551 execve guuid=b4eb2e11-1a00-0000-976e-3ad4f9090000 pid=2553 /usr/bin/dash guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=b4eb2e11-1a00-0000-976e-3ad4f9090000 pid=2553 clone guuid=2e412c12-1a00-0000-976e-3ad4fd090000 pid=2557 /usr/bin/rm delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=2e412c12-1a00-0000-976e-3ad4fd090000 pid=2557 execve guuid=0a337512-1a00-0000-976e-3ad4fe090000 pid=2558 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=0a337512-1a00-0000-976e-3ad4fe090000 pid=2558 execve guuid=d1a52d19-1a00-0000-976e-3ad40f0a0000 pid=2575 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=d1a52d19-1a00-0000-976e-3ad40f0a0000 pid=2575 execve guuid=7e0c6419-1a00-0000-976e-3ad4110a0000 pid=2577 /usr/bin/dash guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=7e0c6419-1a00-0000-976e-3ad4110a0000 pid=2577 clone guuid=7ae2e119-1a00-0000-976e-3ad4150a0000 pid=2581 /usr/bin/rm delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=7ae2e119-1a00-0000-976e-3ad4150a0000 pid=2581 execve guuid=2c92221a-1a00-0000-976e-3ad4170a0000 pid=2583 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=2c92221a-1a00-0000-976e-3ad4170a0000 pid=2583 execve guuid=c735c420-1a00-0000-976e-3ad42a0a0000 pid=2602 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=c735c420-1a00-0000-976e-3ad42a0a0000 pid=2602 execve guuid=b8052221-1a00-0000-976e-3ad42c0a0000 pid=2604 /usr/bin/dash guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=b8052221-1a00-0000-976e-3ad42c0a0000 pid=2604 clone guuid=3345e221-1a00-0000-976e-3ad4310a0000 pid=2609 /usr/bin/rm delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=3345e221-1a00-0000-976e-3ad4310a0000 pid=2609 execve guuid=02333822-1a00-0000-976e-3ad4330a0000 pid=2611 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=02333822-1a00-0000-976e-3ad4330a0000 pid=2611 execve guuid=b8aba72a-1a00-0000-976e-3ad44e0a0000 pid=2638 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=b8aba72a-1a00-0000-976e-3ad44e0a0000 pid=2638 execve guuid=1d73e52a-1a00-0000-976e-3ad4500a0000 pid=2640 /usr/bin/dash guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=1d73e52a-1a00-0000-976e-3ad4500a0000 pid=2640 clone guuid=936c6e2b-1a00-0000-976e-3ad4540a0000 pid=2644 /usr/bin/rm delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=936c6e2b-1a00-0000-976e-3ad4540a0000 pid=2644 execve guuid=086eae2b-1a00-0000-976e-3ad4550a0000 pid=2645 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=086eae2b-1a00-0000-976e-3ad4550a0000 pid=2645 execve guuid=f4528b35-1a00-0000-976e-3ad4700a0000 pid=2672 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=f4528b35-1a00-0000-976e-3ad4700a0000 pid=2672 execve guuid=9e78f135-1a00-0000-976e-3ad4720a0000 pid=2674 /usr/bin/dash guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=9e78f135-1a00-0000-976e-3ad4720a0000 pid=2674 clone guuid=4ced6f36-1a00-0000-976e-3ad4760a0000 pid=2678 /usr/bin/rm delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=4ced6f36-1a00-0000-976e-3ad4760a0000 pid=2678 execve guuid=f2ccaf36-1a00-0000-976e-3ad4780a0000 pid=2680 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=f2ccaf36-1a00-0000-976e-3ad4780a0000 pid=2680 execve guuid=c3f2c13d-1a00-0000-976e-3ad48b0a0000 pid=2699 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=c3f2c13d-1a00-0000-976e-3ad48b0a0000 pid=2699 execve guuid=9c6a213e-1a00-0000-976e-3ad48c0a0000 pid=2700 /usr/bin/dash guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=9c6a213e-1a00-0000-976e-3ad48c0a0000 pid=2700 clone guuid=c8afa63e-1a00-0000-976e-3ad4900a0000 pid=2704 /usr/bin/rm delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=c8afa63e-1a00-0000-976e-3ad4900a0000 pid=2704 execve guuid=ed1cde3e-1a00-0000-976e-3ad4920a0000 pid=2706 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=ed1cde3e-1a00-0000-976e-3ad4920a0000 pid=2706 execve guuid=dbb5d145-1a00-0000-976e-3ad4a50a0000 pid=2725 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=dbb5d145-1a00-0000-976e-3ad4a50a0000 pid=2725 execve guuid=72482d46-1a00-0000-976e-3ad4a70a0000 pid=2727 /tmp/jijs delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=72482d46-1a00-0000-976e-3ad4a70a0000 pid=2727 execve guuid=4c764846-1a00-0000-976e-3ad4aa0a0000 pid=2730 /usr/bin/rm guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=4c764846-1a00-0000-976e-3ad4aa0a0000 pid=2730 execve guuid=5cd2aa46-1a00-0000-976e-3ad4ac0a0000 pid=2732 /usr/bin/wget net send-data write-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=5cd2aa46-1a00-0000-976e-3ad4ac0a0000 pid=2732 execve guuid=f540984e-1a00-0000-976e-3ad4be0a0000 pid=2750 /usr/bin/chmod guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=f540984e-1a00-0000-976e-3ad4be0a0000 pid=2750 execve guuid=052cf54e-1a00-0000-976e-3ad4c00a0000 pid=2752 /tmp/jijs delete-file guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=052cf54e-1a00-0000-976e-3ad4c00a0000 pid=2752 execve guuid=8f5d144f-1a00-0000-976e-3ad4c20a0000 pid=2754 /usr/bin/rm guuid=5e647b09-1a00-0000-976e-3ad4e4090000 pid=2532->guuid=8f5d144f-1a00-0000-976e-3ad4c20a0000 pid=2754 execve 4e9b299b-312c-5d23-bb91-8d9ae7fb883a 69.5.189.168:80 guuid=2356ae09-1a00-0000-976e-3ad4e5090000 pid=2533->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 138B guuid=0a337512-1a00-0000-976e-3ad4fe090000 pid=2558->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 138B guuid=2c92221a-1a00-0000-976e-3ad4170a0000 pid=2583->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 138B guuid=02333822-1a00-0000-976e-3ad4330a0000 pid=2611->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 137B guuid=086eae2b-1a00-0000-976e-3ad4550a0000 pid=2645->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 139B guuid=f2ccaf36-1a00-0000-976e-3ad4780a0000 pid=2680->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 140B guuid=ed1cde3e-1a00-0000-976e-3ad4920a0000 pid=2706->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 136B guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729 /tmp/jijs net send-data zombie guuid=72482d46-1a00-0000-976e-3ad4a70a0000 pid=2727->guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729 clone 5964582a-537a-5ab9-bea4-3571985c6152 69.5.189.168:5555 guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729->5964582a-537a-5ab9-bea4-3571985c6152 send: 64B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 27B ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 208.67.220.220:53 guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729->ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 send: 56B 54d92a3b-1447-55af-b534-047898c60c8d 1.1.1.1:53 guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729->54d92a3b-1447-55af-b534-047898c60c8d send: 27B b0abba15-9a34-51cb-a2ff-3008f7e59616 208.67.222.222:53 guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729->b0abba15-9a34-51cb-a2ff-3008f7e59616 send: 27B guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=5303 /tmp/jijs net net-scan send-data zombie guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=2729->guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=5303 clone guuid=5cd2aa46-1a00-0000-976e-3ad4ac0a0000 pid=2732->4e9b299b-312c-5d23-bb91-8d9ae7fb883a send: 139B guuid=ea41084f-1a00-0000-976e-3ad4c10a0000 pid=2753 /tmp/jijs send-data zombie guuid=052cf54e-1a00-0000-976e-3ad4c00a0000 pid=2752->guuid=ea41084f-1a00-0000-976e-3ad4c10a0000 pid=2753 clone guuid=ea41084f-1a00-0000-976e-3ad4c10a0000 pid=2753->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 54B 6a6ce952-23cd-5c51-b461-6ca6a8c64225 1.0.0.1:53 guuid=ea41084f-1a00-0000-976e-3ad4c10a0000 pid=2753->6a6ce952-23cd-5c51-b461-6ca6a8c64225 send: 54B b4bf20d4-f7c8-5c24-8830-c23364537aa4 8.8.4.4:53 guuid=ea41084f-1a00-0000-976e-3ad4c10a0000 pid=2753->b4bf20d4-f7c8-5c24-8830-c23364537aa4 send: 29B ac570862-0b5b-558b-b43c-fb15134a62c4 114.114.114.114:53 guuid=ea41084f-1a00-0000-976e-3ad4c10a0000 pid=2753->ac570862-0b5b-558b-b43c-fb15134a62c4 send: 29B guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=5303->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=5303|send-data send-data to 3328 IP addresses review logs to see them all guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=5303->guuid=533c3e46-1a00-0000-976e-3ad4a90a0000 pid=5303|send-data send
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-11-08 11:44:22 UTC
File Type:
Text (Shell)
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Ngioweb

sh e513b052f35bbac9e2678b3197867ee47ec0354c58af44d6c1574633f96de934

(this sample)

  
Delivery method
Distributed via web download

Comments