MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f423bf3c71770f069ab5d6bd0109c000c0f97234ee6a8d543d769d195e18ddaf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ngioweb


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f423bf3c71770f069ab5d6bd0109c000c0f97234ee6a8d543d769d195e18ddaf
SHA3-384 hash: dcb8e14cb975aaee9ddd1849fc259de18fe3c30a227fb22857e9ddb4daf01492cfde9c7a19fa7587d90a7f5f31156205
SHA1 hash: c604845251427a277c56522007af30805a11ce02
MD5 hash: 634668be5c5bcc2f1488e2c2d08edf31
humanhash: hawaii-mirror-carpet-xray
File name:ipcam.goahead-rep.sh
Download: download sample
Signature Ngioweb
File size:832 bytes
First seen:2025-11-08 11:25:32 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 6:lOz6/F/K0eCT5Kr7MECZr7MECyr7MEC+Vr7MECXrr7MECCXr7MECfTbVr7MECfTK:78CVbECmECzEClECXoECNEC7bqEC7kH
TLSH T19F015EEF23871396F238DA0A7868BA92715D82C228C47B1461CD2B3FC0EF621F605F51
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://87.121.84.80/frost.armv7d0ca62e68e235aca958e3877ae7ed505c5667207c95d34907bc806e5ffa0b21b Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.armv6f08d8c43beedbc8d45ea133b44dd09e13d80d725846eac7615141dee9064907e Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.armv5966770e3938bb350119a960948a15421d9c6e0944c4d49f5aa631d3bd9fee703 Ngiowebelf geofenced Ngioweb ua-wget USA
http://87.121.84.80/frost.mipsn/an/aelf geofenced ua-wget USA
http://87.121.84.80/frost.mipsel8758eddd99d34eae170f69fe5c58231a546fef0f56a7e30eefac59ef10ca906b Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.aarch647997eca9041eb31e0264e9273d28e3b672f6f6cb206919ea1167610cfa601f93 Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.x86296d6af5b711aada05ec72d517af8b677c32d4f894fda2934ad5289b7f671619 Miraielf geofenced mirai ua-wget USA
http://87.121.84.80/frost.x86_64a85c562d0b13602adfad63635f895ba1fcd8f4780121f7f98febc10fbfba1819 Miraielf geofenced mirai ua-wget USA

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-11-08T09:32:00Z UTC
Last seen:
2025-11-09T01:27:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=bed565af-1900-0000-9c85-934cd30b0000 pid=3027 /usr/bin/sudo guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036 /tmp/sample.bin guuid=bed565af-1900-0000-9c85-934cd30b0000 pid=3027->guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036 execve guuid=248349b2-1900-0000-9c85-934cdd0b0000 pid=3037 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=248349b2-1900-0000-9c85-934cdd0b0000 pid=3037 execve guuid=5244b7ba-1900-0000-9c85-934cf90b0000 pid=3065 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=5244b7ba-1900-0000-9c85-934cf90b0000 pid=3065 execve guuid=74f701bb-1900-0000-9c85-934cfd0b0000 pid=3069 /usr/bin/dash guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=74f701bb-1900-0000-9c85-934cfd0b0000 pid=3069 clone guuid=4fe7b5bb-1900-0000-9c85-934cff0b0000 pid=3071 /usr/bin/rm delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=4fe7b5bb-1900-0000-9c85-934cff0b0000 pid=3071 execve guuid=8b6600bc-1900-0000-9c85-934c000c0000 pid=3072 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=8b6600bc-1900-0000-9c85-934c000c0000 pid=3072 execve guuid=38536ec1-1900-0000-9c85-934c0e0c0000 pid=3086 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=38536ec1-1900-0000-9c85-934c0e0c0000 pid=3086 execve guuid=44f1b7c1-1900-0000-9c85-934c0f0c0000 pid=3087 /usr/bin/dash guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=44f1b7c1-1900-0000-9c85-934c0f0c0000 pid=3087 clone guuid=fae04ac2-1900-0000-9c85-934c110c0000 pid=3089 /usr/bin/rm delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=fae04ac2-1900-0000-9c85-934c110c0000 pid=3089 execve guuid=ee1a8fc2-1900-0000-9c85-934c120c0000 pid=3090 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=ee1a8fc2-1900-0000-9c85-934c120c0000 pid=3090 execve guuid=26999ac8-1900-0000-9c85-934c260c0000 pid=3110 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=26999ac8-1900-0000-9c85-934c260c0000 pid=3110 execve guuid=af0cd4c8-1900-0000-9c85-934c280c0000 pid=3112 /usr/bin/dash guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=af0cd4c8-1900-0000-9c85-934c280c0000 pid=3112 clone guuid=aee347c9-1900-0000-9c85-934c2c0c0000 pid=3116 /usr/bin/rm delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=aee347c9-1900-0000-9c85-934c2c0c0000 pid=3116 execve guuid=465a7fc9-1900-0000-9c85-934c2d0c0000 pid=3117 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=465a7fc9-1900-0000-9c85-934c2d0c0000 pid=3117 execve guuid=78283bde-1900-0000-9c85-934c6b0c0000 pid=3179 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=78283bde-1900-0000-9c85-934c6b0c0000 pid=3179 execve guuid=92c58dde-1900-0000-9c85-934c6c0c0000 pid=3180 /usr/bin/dash guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=92c58dde-1900-0000-9c85-934c6c0c0000 pid=3180 clone guuid=372618df-1900-0000-9c85-934c700c0000 pid=3184 /usr/bin/rm delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=372618df-1900-0000-9c85-934c700c0000 pid=3184 execve guuid=23865edf-1900-0000-9c85-934c720c0000 pid=3186 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=23865edf-1900-0000-9c85-934c720c0000 pid=3186 execve guuid=003f13f0-1900-0000-9c85-934c7d0c0000 pid=3197 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=003f13f0-1900-0000-9c85-934c7d0c0000 pid=3197 execve guuid=598ed5f0-1900-0000-9c85-934c7e0c0000 pid=3198 /usr/bin/dash guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=598ed5f0-1900-0000-9c85-934c7e0c0000 pid=3198 clone guuid=3ba38cf1-1900-0000-9c85-934c800c0000 pid=3200 /usr/bin/rm delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=3ba38cf1-1900-0000-9c85-934c800c0000 pid=3200 execve guuid=5219dbf1-1900-0000-9c85-934c810c0000 pid=3201 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=5219dbf1-1900-0000-9c85-934c810c0000 pid=3201 execve guuid=7274defb-1900-0000-9c85-934c8f0c0000 pid=3215 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=7274defb-1900-0000-9c85-934c8f0c0000 pid=3215 execve guuid=343d22fc-1900-0000-9c85-934c910c0000 pid=3217 /usr/bin/dash guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=343d22fc-1900-0000-9c85-934c910c0000 pid=3217 clone guuid=295095fc-1900-0000-9c85-934c950c0000 pid=3221 /usr/bin/rm delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=295095fc-1900-0000-9c85-934c950c0000 pid=3221 execve guuid=910bd1fc-1900-0000-9c85-934c970c0000 pid=3223 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=910bd1fc-1900-0000-9c85-934c970c0000 pid=3223 execve guuid=2bac8306-1a00-0000-9c85-934ca80c0000 pid=3240 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=2bac8306-1a00-0000-9c85-934ca80c0000 pid=3240 execve guuid=dded0307-1a00-0000-9c85-934caa0c0000 pid=3242 /tmp/cltn delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=dded0307-1a00-0000-9c85-934caa0c0000 pid=3242 execve guuid=3fe52907-1a00-0000-9c85-934cac0c0000 pid=3244 /usr/bin/rm guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=3fe52907-1a00-0000-9c85-934cac0c0000 pid=3244 execve guuid=cba8a807-1a00-0000-9c85-934cae0c0000 pid=3246 /usr/bin/wget net send-data write-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=cba8a807-1a00-0000-9c85-934cae0c0000 pid=3246 execve guuid=e1762a18-1a00-0000-9c85-934cb10c0000 pid=3249 /usr/bin/chmod guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=e1762a18-1a00-0000-9c85-934cb10c0000 pid=3249 execve guuid=87808a18-1a00-0000-9c85-934cb20c0000 pid=3250 /tmp/cltn delete-file guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=87808a18-1a00-0000-9c85-934cb20c0000 pid=3250 execve guuid=086caa18-1a00-0000-9c85-934cb40c0000 pid=3252 /usr/bin/rm guuid=91f3d8b1-1900-0000-9c85-934cdc0b0000 pid=3036->guuid=086caa18-1a00-0000-9c85-934cb40c0000 pid=3252 execve 8a0fa304-c855-5f37-833d-84ef77e0b826 87.121.84.80:80 guuid=248349b2-1900-0000-9c85-934cdd0b0000 pid=3037->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=8b6600bc-1900-0000-9c85-934c000c0000 pid=3072->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=ee1a8fc2-1900-0000-9c85-934c120c0000 pid=3090->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 138B guuid=465a7fc9-1900-0000-9c85-934c2d0c0000 pid=3117->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 137B guuid=23865edf-1900-0000-9c85-934c720c0000 pid=3186->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 139B guuid=5219dbf1-1900-0000-9c85-934c810c0000 pid=3201->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 140B guuid=910bd1fc-1900-0000-9c85-934c970c0000 pid=3223->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 136B guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3243 /tmp/cltn net send-data zombie guuid=dded0307-1a00-0000-9c85-934caa0c0000 pid=3242->guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3243 clone 5964582a-537a-5ab9-bea4-3571985c6152 69.5.189.168:5555 guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3243->5964582a-537a-5ab9-bea4-3571985c6152 send: 65B b4bf20d4-f7c8-5c24-8830-c23364537aa4 8.8.4.4:53 guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3243->b4bf20d4-f7c8-5c24-8830-c23364537aa4 send: 29B guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3315 /tmp/cltn net net-scan send-data zombie guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3243->guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3315 clone guuid=cba8a807-1a00-0000-9c85-934cae0c0000 pid=3246->8a0fa304-c855-5f37-833d-84ef77e0b826 send: 139B guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=3251 /tmp/cltn net send-data zombie guuid=87808a18-1a00-0000-9c85-934cb20c0000 pid=3250->guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=3251 clone guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=3251->5964582a-537a-5ab9-bea4-3571985c6152 send: 68B b0abba15-9a34-51cb-a2ff-3008f7e59616 208.67.222.222:53 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=3251->b0abba15-9a34-51cb-a2ff-3008f7e59616 send: 27B 6a6ce952-23cd-5c51-b461-6ca6a8c64225 1.0.0.1:53 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=3251->6a6ce952-23cd-5c51-b461-6ca6a8c64225 send: 27B ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 208.67.220.220:53 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=3251->ab7b7b79-1dfc-52b2-b0c8-4756a62bd7f5 send: 29B guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304 /tmp/cltn net net-scan send-data zombie guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=3251->guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304 clone 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3315->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3315|send-data send-data to 4097 IP addresses review logs to see them all guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3315->guuid=015d1f07-1a00-0000-9c85-934cab0c0000 pid=3315|send-data send guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con 73cd3a4b-870a-571d-953c-04117cfdd0a2 122.99.61.199:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->73cd3a4b-870a-571d-953c-04117cfdd0a2 send: 124B 7d709752-d5a9-5891-8dad-f17b358ec672 18.245.41.9:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->7d709752-d5a9-5891-8dad-f17b358ec672 send: 120B d5491471-7f6d-5850-97bb-36052d866a98 138.4.120.49:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->d5491471-7f6d-5850-97bb-36052d866a98 send: 122B 0b227729-66d6-5f2b-8381-8597c9d5bad9 156.225.20.229:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->0b227729-66d6-5f2b-8381-8597c9d5bad9 send: 126B 77af0eda-2b1f-50c8-89e4-ac2ed935550d 184.25.70.214:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->77af0eda-2b1f-50c8-89e4-ac2ed935550d send: 124B 029b20f5-b7cd-5f04-a3ee-7228e90c7a20 220.134.191.16:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->029b20f5-b7cd-5f04-a3ee-7228e90c7a20 send: 126B bab0252a-bfa5-553b-933a-3757075eeca6 64.176.164.185:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->bab0252a-bfa5-553b-933a-3757075eeca6 send: 126B 7dd73229-980c-5029-9007-ebd7df621784 52.42.117.146:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->7dd73229-980c-5029-9007-ebd7df621784 send: 124B 5bc1cd1d-b96a-5b28-94fc-47bcbf69ca94 34.117.46.175:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->5bc1cd1d-b96a-5b28-94fc-47bcbf69ca94 send: 124B d0df6aaa-505a-561f-9228-1e58cb06c121 34.214.191.51:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->d0df6aaa-505a-561f-9228-1e58cb06c121 send: 124B 82381b61-7854-5c10-a58e-97d920137e4c 106.75.18.45:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->82381b61-7854-5c10-a58e-97d920137e4c send: 122B 51fef3ba-602f-5259-a800-63f892a3384a 78.192.55.26:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->51fef3ba-602f-5259-a800-63f892a3384a send: 122B 2a23d5b5-38f1-5fe9-9095-24065f69332e 208.124.174.196:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->2a23d5b5-38f1-5fe9-9095-24065f69332e send: 128B d89c8789-cd64-5486-a84d-951d67c5d9d2 18.202.95.179:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->d89c8789-cd64-5486-a84d-951d67c5d9d2 send: 124B c2644aa1-9564-565d-b52b-56262bee0f11 18.164.160.236:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->c2644aa1-9564-565d-b52b-56262bee0f11 send: 126B 1e0a16bd-5443-570c-a8bf-7bf0d9e57cf1 52.210.24.135:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->1e0a16bd-5443-570c-a8bf-7bf0d9e57cf1 send: 124B 2e1042dd-e077-5c22-a67f-039759ec8b7a 204.80.222.71:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->2e1042dd-e077-5c22-a67f-039759ec8b7a send: 124B bf854929-2594-56fb-a6ac-d2b9f24fd8c8 184.85.120.162:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->bf854929-2594-56fb-a6ac-d2b9f24fd8c8 send: 126B f01b6ff8-a374-51f7-bf58-5b9976e4e0ef 52.49.96.246:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->f01b6ff8-a374-51f7-bf58-5b9976e4e0ef send: 122B 4918bf0d-5c1f-5f51-8bf4-ece301cd09fa 52.5.130.181:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->4918bf0d-5c1f-5f51-8bf4-ece301cd09fa send: 122B 7be062b0-f429-5f4f-bc55-c8764a3d38e0 52.27.201.44:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->7be062b0-f429-5f4f-bc55-c8764a3d38e0 send: 122B 29bb40b7-0426-5926-a455-d916b8dfc255 198.177.120.193:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->29bb40b7-0426-5926-a455-d916b8dfc255 send: 128B 9b8aa86b-3f2c-5ccd-a35e-4b08e9dfcd27 122.116.128.12:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->9b8aa86b-3f2c-5ccd-a35e-4b08e9dfcd27 send: 126B c400d965-b4d6-528c-b135-d5af133e9ca6 204.205.135.70:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->c400d965-b4d6-528c-b135-d5af133e9ca6 send: 126B 4e7fde0c-e2c3-51f2-bb67-a2d3b018faf7 204.207.98.131:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->4e7fde0c-e2c3-51f2-bb67-a2d3b018faf7 send: 126B d01bddd7-59ab-5d9d-898e-039bf7e21e56 18.154.38.80:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->d01bddd7-59ab-5d9d-898e-039bf7e21e56 send: 122B 9ac95799-a8d1-548d-9df1-8094ce3c7772 52.195.140.61:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->9ac95799-a8d1-548d-9df1-8094ce3c7772 send: 124B 1d65f97a-4c30-5e64-bcb7-79630b2326d3 52.217.227.189:80 guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->1d65f97a-4c30-5e64-bcb7-79630b2326d3 send: 126B guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304|send-data send-data to 4041 IP addresses review logs to see them all guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304->guuid=ed95a118-1a00-0000-9c85-934cb30c0000 pid=5304|send-data send
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-11-08 11:26:15 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Ngioweb

sh f423bf3c71770f069ab5d6bd0109c000c0f97234ee6a8d543d769d195e18ddaf

(this sample)

  
Delivery method
Distributed via web download

Comments