MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e7d6ac11f46125578e851df8f8c84a6e73501c8a5c9d6766056796dbb1e0950c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: e7d6ac11f46125578e851df8f8c84a6e73501c8a5c9d6766056796dbb1e0950c
SHA3-384 hash: b962f2f97c5b4b8123ffdadbdd5968e654b358de2eec6fcec027984f0ee952397fe65c2d3dd32c7df4db81609a1d91e7
SHA1 hash: 0082dc7aaa47091aba25b9af1f84725cb8926a9b
MD5 hash: 8e7c1bdc6c53c4930e7c1b1937649dd9
humanhash: johnny-wyoming-lake-uniform
File name:bbc
Download: download sample
File size:525 bytes
First seen:2026-02-02 21:11:51 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 6:hLgjJ5Ja/+YcLN7+Y3JMF/+Ye0IdyJ44LIXLoO4eGLw+v+YdF/vNnQz2JMIykwFL:lSjkOLZpqjW3bo/8pqF82Q/NiTZEfs0t
TLSH T1B2F0270FA04BF03AD08419E8EB61FB6AAC30B86B6377DE4C78407610FFD6434B862244
TrID 70.0% (.SH) Linux/UNIX shell script (7000/1)
30.0% (.) Unix-like shebang (var.3) (gen) (3000/1)
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://176.65.139.21/file/n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=cf22a677-1a00-0000-6374-7d03e90c0000 pid=3305 /usr/bin/sudo guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311 /tmp/sample.bin guuid=cf22a677-1a00-0000-6374-7d03e90c0000 pid=3305->guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311 execve guuid=bcf3de79-1a00-0000-6374-7d03f00c0000 pid=3312 /usr/bin/uname guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=bcf3de79-1a00-0000-6374-7d03f00c0000 pid=3312 execve guuid=cfaf6b7a-1a00-0000-6374-7d03f10c0000 pid=3313 /usr/bin/pgrep guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=cfaf6b7a-1a00-0000-6374-7d03f10c0000 pid=3313 execve guuid=700db67e-1a00-0000-6374-7d03f90c0000 pid=3321 /usr/bin/rm guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=700db67e-1a00-0000-6374-7d03f90c0000 pid=3321 execve guuid=7d21fd7e-1a00-0000-6374-7d03fa0c0000 pid=3322 /usr/bin/busybox net send-data write-file guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=7d21fd7e-1a00-0000-6374-7d03fa0c0000 pid=3322 execve guuid=13aa5a96-1a00-0000-6374-7d03180d0000 pid=3352 /usr/bin/chmod guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=13aa5a96-1a00-0000-6374-7d03180d0000 pid=3352 execve guuid=c4b3ff96-1a00-0000-6374-7d031b0d0000 pid=3355 /tmp/data.x86_64 net guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=c4b3ff96-1a00-0000-6374-7d031b0d0000 pid=3355 execve guuid=fc2f4597-1a00-0000-6374-7d031e0d0000 pid=3358 /usr/bin/rm delete-file guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=fc2f4597-1a00-0000-6374-7d031e0d0000 pid=3358 execve guuid=9bd0b297-1a00-0000-6374-7d03240d0000 pid=3364 /usr/bin/rm delete-file guuid=43609479-1a00-0000-6374-7d03ef0c0000 pid=3311->guuid=9bd0b297-1a00-0000-6374-7d03240d0000 pid=3364 execve b8df4a95-acac-5303-8c74-46f21c0a6594 176.65.139.21:80 guuid=7d21fd7e-1a00-0000-6374-7d03fa0c0000 pid=3322->b8df4a95-acac-5303-8c74-46f21c0a6594 send: 92B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=c4b3ff96-1a00-0000-6374-7d031b0d0000 pid=3355->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=e0e43797-1a00-0000-6374-7d031d0d0000 pid=3357 /tmp/data.x86_64 zombie guuid=c4b3ff96-1a00-0000-6374-7d031b0d0000 pid=3355->guuid=e0e43797-1a00-0000-6374-7d031d0d0000 pid=3357 clone guuid=09714897-1a00-0000-6374-7d031f0d0000 pid=3359 /tmp/data.x86_64 zombie guuid=e0e43797-1a00-0000-6374-7d031d0d0000 pid=3357->guuid=09714897-1a00-0000-6374-7d031f0d0000 pid=3359 clone guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361 /tmp/data.x86_64 dns net send-data zombie guuid=09714897-1a00-0000-6374-7d031f0d0000 pid=3359->guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361 clone guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 340B 4bffe368-2775-554a-aaad-bcb0f74b8def 49.55.54.46:25565 guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361->4bffe368-2775-554a-aaad-bcb0f74b8def send: 2B guuid=f77f8897-1a00-0000-6374-7d03220d0000 pid=3362 /tmp/data.x86_64 guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361->guuid=f77f8897-1a00-0000-6374-7d03220d0000 pid=3362 clone guuid=b6daf09a-1a00-0000-6374-7d032e0d0000 pid=3374 /usr/bin/dash guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361->guuid=b6daf09a-1a00-0000-6374-7d032e0d0000 pid=3374 execve guuid=7c2de2a5-1a00-0000-6374-7d034d0d0000 pid=3405 /usr/bin/dash guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361->guuid=7c2de2a5-1a00-0000-6374-7d034d0d0000 pid=3405 execve guuid=4f9e9ca6-2100-0000-6374-7d03b5140000 pid=5301 /usr/bin/dash guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361->guuid=4f9e9ca6-2100-0000-6374-7d03b5140000 pid=5301 execve guuid=4d27e4a7-2100-0000-6374-7d03b7140000 pid=5303 /usr/bin/dash guuid=b9017e97-1a00-0000-6374-7d03210d0000 pid=3361->guuid=4d27e4a7-2100-0000-6374-7d03b7140000 pid=5303 execve guuid=b862599b-1a00-0000-6374-7d032f0d0000 pid=3375 /usr/sbin/xtables-nft-multi guuid=b6daf09a-1a00-0000-6374-7d032e0d0000 pid=3374->guuid=b862599b-1a00-0000-6374-7d032f0d0000 pid=3375 execve guuid=d8d60da6-1a00-0000-6374-7d034f0d0000 pid=3407 /usr/sbin/xtables-nft-multi guuid=7c2de2a5-1a00-0000-6374-7d034d0d0000 pid=3405->guuid=d8d60da6-1a00-0000-6374-7d034f0d0000 pid=3407 execve guuid=366d16a7-2100-0000-6374-7d03b6140000 pid=5302 /usr/sbin/xtables-nft-multi guuid=4f9e9ca6-2100-0000-6374-7d03b5140000 pid=5301->guuid=366d16a7-2100-0000-6374-7d03b6140000 pid=5302 execve guuid=0a365ea8-2100-0000-6374-7d03b8140000 pid=5304 /usr/sbin/xtables-nft-multi guuid=4d27e4a7-2100-0000-6374-7d03b7140000 pid=5303->guuid=0a365ea8-2100-0000-6374-7d03b8140000 pid=5304 execve
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-02-02 13:03:34 UTC
File Type:
Text (Shell)
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Linux_IoT_MultiArch_BotnetLoader_Generic
Author:Anish Bogati
Description:Technique-based detection of IoT/Linux botnet loader shell scripts downloading binaries from numeric IPs, chmodding, and executing multi-architecture payloads
Reference:MalwareBazaar sample lilin.sh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh e7d6ac11f46125578e851df8f8c84a6e73501c8a5c9d6766056796dbb1e0950c

(this sample)

  
Delivery method
Distributed via web download

Comments