MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f60ef986ddcfcd19f22cffdaea794d08dcde1f408e63ac4a880d6646966a9e90. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: f60ef986ddcfcd19f22cffdaea794d08dcde1f408e63ac4a880d6646966a9e90
SHA3-384 hash: b367a72babe07e8e15ea47e5c9781e484bac0e0deea7f148eecdb9aa2a3a6a25600b6330a6d16ea6c949ec3d3543d0b9
SHA1 hash: cb855532f79d964dbd8f59b5afbf2eb7aea4e4f4
MD5 hash: 36dada56c2ce62fe5111a38cc8030fb1
humanhash: failed-crazy-green-grey
File name:sm
Download: download sample
Signature Gafgyt
File size:190 bytes
First seen:2025-10-28 16:39:41 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 3:zBMXBgHecoZ0kL4UdQCaeFGBzSEyLTUWn5d3L4UdQCLJe8BzSE8eUsJ05dI:tfj00rEANIvLsElJNd6LI
TLSH T1F0C012AB19541A0044C4FDCD35760A1E505AC2A929920B9EFAFC2075C188502F042B4B
Magika shell
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://23.177.185.39/mips2cae01a9c5ccb06c91d94ba45a9aaec9f804f60f9bf86cdf97daf5ceacae8f4f Mirai32-bit elf gafgyt mirai Mozi
http://23.177.185.39/mpsl9b9764585122f6e0d842fb301963fed0cb6cba5a12740fec2c660d1f636bafd5 Miraielf gafgyt mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
47
Origin country :
DE DE
Vendor Threat Intelligence
Status:
terminated
Behavior Graph:
%3 guuid=fe1ce2f7-1800-0000-9e49-0507dd070000 pid=2013 /usr/bin/sudo guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018 /tmp/sample.bin guuid=fe1ce2f7-1800-0000-9e49-0507dd070000 pid=2013->guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018 execve guuid=80610efc-1800-0000-9e49-0507e3070000 pid=2019 /usr/bin/mkdir guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=80610efc-1800-0000-9e49-0507e3070000 pid=2019 execve guuid=6cd410fd-1800-0000-9e49-0507e6070000 pid=2022 /usr/bin/wget net send-data write-file guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=6cd410fd-1800-0000-9e49-0507e6070000 pid=2022 execve guuid=89357e22-1900-0000-9e49-050730080000 pid=2096 /usr/bin/chmod guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=89357e22-1900-0000-9e49-050730080000 pid=2096 execve guuid=d9b6c122-1900-0000-9e49-050732080000 pid=2098 /usr/bin/dash guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=d9b6c122-1900-0000-9e49-050732080000 pid=2098 clone guuid=99447023-1900-0000-9e49-050735080000 pid=2101 /usr/bin/rm delete-file guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=99447023-1900-0000-9e49-050735080000 pid=2101 execve guuid=733fbc23-1900-0000-9e49-050737080000 pid=2103 /usr/bin/wget net send-data write-file guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=733fbc23-1900-0000-9e49-050737080000 pid=2103 execve guuid=5bf30847-1900-0000-9e49-050780080000 pid=2176 /usr/bin/chmod guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=5bf30847-1900-0000-9e49-050780080000 pid=2176 execve guuid=71454547-1900-0000-9e49-050781080000 pid=2177 /usr/bin/dash guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=71454547-1900-0000-9e49-050781080000 pid=2177 clone guuid=725dd049-1900-0000-9e49-050789080000 pid=2185 /usr/bin/rm delete-file guuid=961cb3fb-1800-0000-9e49-0507e2070000 pid=2018->guuid=725dd049-1900-0000-9e49-050789080000 pid=2185 execve ba55188c-1d8c-531d-84cb-0b022f7a1844 23.177.185.39:80 guuid=6cd410fd-1800-0000-9e49-0507e6070000 pid=2022->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 132B guuid=733fbc23-1900-0000-9e49-050737080000 pid=2103->ba55188c-1d8c-531d-84cb-0b022f7a1844 send: 132B
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2025-10-28 16:42:42 UTC
File Type:
Text (Shell)
AV detection:
4 of 24 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_202412_suspect_bash_script
Author:abuse.ch
Description:Detects suspicious Linux bash scripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

sh f60ef986ddcfcd19f22cffdaea794d08dcde1f408e63ac4a880d6646966a9e90

(this sample)

  
Delivery method
Distributed via web download

Comments