Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    We Used 5 Outlier Detection Strategies on a Actual Dataset: They Disagreed on 96% of Flagged Samples

    March 13, 2026

    Key Capabilities and Pricing Defined

    March 13, 2026

    Why Monitoring Issues In 2026

    March 13, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Shadowhs-fileless-linux-post-exploitation-framework
    AI Ethics & Regulation

    Shadowhs-fileless-linux-post-exploitation-framework

    Declan MurphyBy Declan MurphyJanuary 31, 2026No Comments17 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Shadowhs-fileless-linux-post-exploitation-framework
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    ShadowHS: A Fileless Linux Put up‑Exploitation Framework Constructed on a Weaponized hackshell

    Cyble uncovers ShadowHS, a stealthy fileless Linux framework operating totally in reminiscence for covert, adaptive publish‑exploitation management.

    Government Abstract

    Cyble Analysis & Intelligence Labs (CRIL) has recognized a Linux intrusion chain leveraging a extremely obfuscated, fileless loader that deploys a weaponized variant of hackshell totally from reminiscence. Cyble tracks this exercise below the identify ShadowHS, reflecting its fileless execution mannequin and lineage from the unique hackshell utility. Not like typical Linux malware that emphasizes automated propagation or fast monetization, this exercise prioritizes stealth, operator security, and lengthy‑time period interactive management over compromised techniques.

    The loader decrypts and executes its payload solely in reminiscence, leaving no persistent binary artifacts on disk. As soon as energetic, the payload exposes an interactive publish‑exploitation atmosphere that aggressively fingerprints host safety controls, enumerates defensive tooling, and evaluates prior compromise earlier than enabling greater‑danger actions. Whereas noticed runtime behaviour stays intentionally conservative, payload evaluation reveals a broad set of latent capabilities, together with fingerprinting, credential entry, lateral motion, privilege escalation, cryptomining, reminiscence inspection, and covert knowledge exfiltration.

    Notably, the framework consists of operator‑pushed knowledge exfiltration mechanisms that keep away from conventional community transports altogether, as a substitute abusing person‑area tunneling to stage or extract knowledge in a way designed to evade firewall controls and endpoint monitoring.

    This clear separation between restrained runtime behaviour and in depth dormant performance strongly suggests deliberate operator tradecraft fairly than commodity malware logic. Total, the exercise displays a mature, multi‑function Linux publish‑compromise platform optimized for fileless execution, interactive management, and situationally adaptive growth.

    Key Takeaways

    • The payload just isn’t a standalone malware binary however a weaponized post-exploitation framework, derived from hackshell and tailored for long-term, interactive operator use.
    • Incorporates fileless execution as its core design precept. The payload executes from nameless file descriptors, spoofs argv[0], and avoids persistent filesystem artifacts, considerably complicating detection and forensic reconstruction.
    • Runtime behaviour is deliberately restrained. The payload initially focuses on environmental consciousness, safety management discovery, and operator security, whereas harmful or noisy actions stay dormant until explicitly invoked.
    • The framework consists of covert, operator‑initiated knowledge staging and exfiltration primitives that abuse person‑area tunneling and authentic administrative tooling, enabling stealthy knowledge motion even in tightly restricted community environments.
    • The presence of intensive EDR/AV fingerprinting, kernel integrity checks, and in-memory malware detection suggests the operator expects to function in defended enterprise environments fairly than opportunistic or unmanaged techniques.
    • Dormant modules for credential entry, lateral motion, crypto-mining, and anti-competition cleanup point out that the payload may be dynamically repurposed based mostly on operator intent, with out altering the loader or redeploying artifacts.
    • Total, the tradecraft noticed aligns extra carefully with superior intrusion tooling or red-team frameworks than with commodity Linux malware, emphasizing flexibility, stealth, and handbook management over automation.

    Technical Evaluation

    The analyzed intrusion chain consists of two main elements:

    1. A multi-stage, encrypted shell loader answerable for payload decryption, reconstruction, and fileless execution.
    2. An in-memory payload that resolves to a closely modified model of hackshell, weaponised right into a full-featured operator framework. It may well obtain different malware elements (akin to kernel exploits, cryptominer, and fingerprinting modules) as required by the operator.

    Design selections noticed all through the chain—together with encrypted embedded payloads, execution context consciousness, argv spoofing, and in depth OPSEC logic—point out a toolset meant for managed publish‑exploitation fairly than mass exploitation. The framework permits operators to evaluate host posture, stay undetected for prolonged durations, and selectively activate further capabilities.

    The an infection move begins with execution of the obfuscated shell loader, which decrypts an embedded payload utilizing AES‑256‑CBC, reconstructs it in reminiscence, and executes it instantly by way of /proc//fd/. At no stage is the payload written to disk.

    As soon as executed, the payload initializes an interactive shell atmosphere. From this level ahead, all exercise is explicitly operator‑pushed. Quite than mechanically deploying miners, extracting knowledge, or trying propagation, the framework prioritizes reconnaissance, defensive consciousness, and operational safety. Superior actions—akin to covert knowledge exfiltration utilizing person‑area tunnels, credential harvesting, or privilege escalation—can be found on demand, reinforcing that this tooling is designed for deliberate, lengthy‑time period intrusion operations fairly than noisy, automated campaigns.

    At first look, the malware seems to comprise 3 strains of closely obfuscated shell code, the place we see a high-entropy payload assigned to the particular shell variable _ & staged text-encoded payload staged and emitted by way of shell escape processing ($’…’). (See Determine 1)

    Figure 1– Entropy Graph of Obfuscated Shell Script
    Determine 1 – Entropy Graph of Obfuscated Shell Script

    Loader Script

    Upon evaluation, it turned out to be a multi-stage, encrypted Linux loader with embedded payload written in POSIX shell, leveraging OpenSSL, Perl, and gzip to decrypt, decompress, and execute a payload totally in reminiscence. (See Determine 2)

    Figure 2– Obfuscated Shell Script
    Determine 2 – Obfuscated Shell Script

    The malware demonstrates tradecraft according to mature red-team tooling or superior post-compromise frameworks, fairly than commodity botnet loaders. Key traits embody:

    • Password-protected AES-256-CBC encrypted payload
    • Dynamic execution path detection (supply vs eval vs exec)
    • Fileless execution with argv spoofing
    • Setting hardening to evade logging
    • Dwell system safety introspection
    • Operator-facing interactive CLI

    Dependency Validation

    Upon execution, the loader validates runtime dependencies (openssl, perl, gunzip) required for decryption and decompression. The absence of any fallback logic suggests focused, operator-controlled assaults fairly than opportunistic mass exploitation. (See Determine 3)

    Figure 3– Runtime Dependency Validation
    Determine 3 – Runtime Dependency Validation

    Credential-Primarily based Payload Decryption

    The loader comprises an embedded Base64-encoded password and an encrypted management blob, each of that are decrypted utilizing OpenSSL. Throughout execution, the decrypted worth (R=4817) is used as a byte offset to skip a binary header throughout stream reconstruction. The decryption command is dynamically assembled at runtime:

    This ensures that the compressed payload can’t be recovered statically with out the total execution context.

    Execution Context Consciousness

    Execution culminates in an interactive post-exploitation atmosphere that explicitly minimizes filesystem artifacts, enumerates system safety posture, and adapts execution based mostly on shell context (Bash/Zsh). (See Determine 4)

    Figure 4– Determining Execution Context
    Determine 4 – Figuring out Execution Context

    The loader dynamically determines the way it was invoked so as to assure right payload execution — a sample unusual in commodity malware however frequent in operator-driven frameworks :

    • Supply execution: $BASH_SOURCE[0]
    • Eval execution: $BASH_EXECUTION_STRING
    • Direct file execution: $0
    • Zsh compatibility: $ZSH_EVAL_CONTEXT

    Payload Reconstruction & Fileless Execution

    The payload is reconstructed by a multi-stage decoding pipeline consisting of Perl marker translation, AES-256-CBC decryption, Perl byte skipping (R=4817), and gzip decompression. The ensuing binary is executed instantly from reminiscence by way of /proc//fd/ utilizing exec, with a spoofed argv[0] (${0:-python3}) (See Determine 5)

    Figure 5– Payload Reconstruction & Fileless Execution
    Determine 5 – Payload Reconstruction & Fileless Execution

    This ensures the payload by no means touches disk, evades file-integrity monitoring and conventional AV inspection, and obscures course of attribution throughout incident response.

    Importantly, all arguments handed to the loader are forwarded to the payload unchanged. This allows operator-controlled execution modes and on-demand conduct whereas protecting the loader’s conduct static—a deliberate tradecraft alternative that complicates detection methods that depend on argument patterns.

    Weaponized Hackshell

    As soon as decrypted and executed instantly from reminiscence, the payload resolves to a closely modified variant of hackshell, repurposed from a light-weight post-exploitation helper into a completely operator-driven intrusion framework. At runtime, it presents an interactive shell and explicitly indicators that it avoids filesystem writes, instantly establishing intent for long-lived, low-noise operator interplay fairly than smash-and-grab exercise.

    Payload Capabilities

    The payload begins by fingerprinting the host and reporting environmental context again to the operator, together with OS particulars, energetic customers, PTYs, and privilege boundaries. This early-stage reconnaissance signifies that the operator is anticipated to make knowledgeable handbook selections fairly than depend on totally automated tasking. (See Determine 6)

    Figure 6 – Payload Reconstruction & Fileless Execution
    Determine 6 – Payload Reconstruction & Fileless Execution

    Expanded EDR / AV fingerprinting

    The payload performs aggressive EDR and AV discovery utilizing each filesystem path checks and service-state enumeration. In comparison with upstream hackshell, this variant considerably expands protection to incorporate industrial EDR platforms, cloud brokers, OT/ICS tooling, and telemetry collectors.

    • Notable file-path-based detections (_hs_chk_fn) embody CrowdStrike, LimaCharlie, Tanium, OTEL collectors, cloud vendor brokers (Qcloud, Argus agent). (See Determine 7.1)
    • Service-based detections (_hs_chk_systemd) embody Falcon Sensor,  Cybereason, Elastic Agent, Sophos Intercept X & SPL, Cortex XDR, WithSecure, Wazuh, Rapid7, and Microsoft Defender (mdatp). (See Determine 7.2)
    Figure 7.1 – File Path-based EDR Detection
    Determine 7.1 – File Path-based EDR Detection
    Figure 7.2 – Service-based EDR detection
    Determine 7.2 – Service-based EDR detection

    These checks are surfaced on to the operator, reinforcing that that is an interactive intrusion instrument fairly than a background implant.

    Anti-competition Logic

    The malware implements strong anti-competition logic designed to determine and terminate rival miners and in-memory implants. It actively hunts for competing malware households akin to Rondo and Kinsing, detects kernel rootkits by way of LKM and kernel-taint checks, and enumerates deleted or memfd-backed executables.

    The payload collects PIDs related to XMRig miners, UPX-packed binaries, and associated scripts. It comprises specific logic to detect and kill Ebury — a widely known OpenSSH credential-stealing backdoor focusing on Linux servers.

    In parallel, the framework performs deep safety posture introspection by enumerating kernel protections akin to AppArmor, inspecting loaded kernel modules, and surveying /proc for indicators of instrumentation or prior compromise.

    This allows the operator to quickly assess whether or not the host is already contaminated, monitored, or hardened. (See Determine 8)

    Figure 8 – Anti-Competition Logic
    Determine 8 – Anti-Competitors Logic

    PATH manipulation, mixed with TMPDIR and HOME relocation, additional permits command shadowing and the execution of helper binaries from memory-backed places, decreasing forensic residue and enhancing operational flexibility.

    Dormant / On‑Demand Capabilities

    Whereas runtime execution stays restrained, evaluation of the payload code reveals a broad set of dormant capabilities that may be invoked on demand by way of operator instructions or invocation arguments.

    Notable on-demand capabilities embody:

    • Execution gating by way of _once() to make sure sure actions run solely as soon as per host or session.
    • Reminiscence dumping routines able to extracting & dumping credentials/secrets and techniques from stay processes. (See Determine 9)
    Figure 9 – Dumping in-process Secrets
    Determine 9 – Dumping in-process Secrets and techniques
    • SSH-based community scanning and lateral motion tooling, together with help for legacy cryptographic algorithms. (See Determine 10)
    Figure 10 – Support for Legacy Cryptographic Algorithms
    Determine 10 – Assist for Legacy Cryptographic Algorithms
    • Credential theft focusing on AWS credentials, SSH keys, GitLab, Bitrix database, WordPress database, OpenStack person knowledge, Yandex Cloud person knowledge, Docker, Proxmox VMs and LXC, OpenVZ, and person HOME listing.
    • Privilege escalation by way of execution of exploits downloaded from hardcoded C2 infrastructure. Throughout evaluation, a number of kernel exploits, an auto-exploitation script & a C supply file have been recovered from the C2 server. (Hashes talked about within the IOC part) (See Determine 11)
    Figure 11 – Exploit Deployment
    Determine 11 – Exploit Deployment

    Cryptomining

    The framework implements a number of CPU and GPU cryptocurrency mining workflows, together with XMRig, XMR-Stak, GMiner, and lolMiner, with pool failover logic. Miner configuration dynamically sources employee identifiers from bootcfg*.knowledge information and executes miners by a wrapper (./-bash-screen) utilizing password strings akin to c=XMR,mc=${COIN_NAME}, the place COIN_NAME defaults to “${1:-FREN}”.

    GMiner operates utilizing the Kawpow algorithm with configured depth, whereas further miners goal RYO and ETCHASH utilizing CUDA backends and hardcoded pockets addresses and swimming pools, together with infrastructure at 204.93.253[.]180. (See Determine 12)

    Figure 12 – Cryptominer Deployment
    Determine 12 – Cryptominer Deployment
    • GMiner applied in gpu() makes use of kawpow algorithm with 75 depth
      • Pockets deal with – 88H9UmU6QyYiGeZdR6hXZJXtJF9Z8zLHDQbC1NV1PDdjCynBq3QKzB1fo1NRhgMX4cBx68Rva5msyKW3PGXfPhCA4itHmiv
      • 87YLCx7zEFghgMEeZvJCZ3gHyS3fUsbAnXSTH8nh8EP7SeptPH8Pnh18snravwhE3dfRt5x67aWo8e6tSJ2cv4mpRNkSdqL
    • Pool precedence utilized by miner
      • 204.93.253[.]180 at port 4080
      • Kawpow.na.mine.zergpool[.]com at port 3638
      • Kawpow.asia.mine.zergpool[.]com at port 3638
      • kawpow.eu.mine.zergpool[.]com at port 3638

    The opposite 2 miners’ particulars are:

    • XMR-Stak (gpustak())
      • Pockets deal with – RYoNsBiFU6iYi8rqkmyE9c4SftzYzWPCGA3XvcXbGuBYcqDQJWe8wp8NEwNicFyzZgKTSjCjnpuXTitwn6VdBcFZEFXLcY4DwEsWGnj1SC1Sgq
      • Backend – CUDA (libxmrstak_cuda_backend.so)
      • Pool server – 204.93.253[.]180:3080
    • LolMiner (gpuecho())
      • Pockets deal with – 0xd67f158b2bcc819eee7029f3477f0270ec1d37b4
      • Pool server – 204.93.253[.]180:1080

    Covert Knowledge Staging and Exfiltration by way of GSocket‑Backed rsync

    The payload implements devoted knowledge staging helpers (rs() and rs1()) that allow stealthy exfiltration of information or directories from the compromised host utilizing rsync, whereas intentionally avoiding typical community transports akin to SSH, SCP, or SFTP. As an alternative of counting on customary TCP connections, the payload replaces rsync’s transport layer by way of the -e possibility with GSocket person‑area tunnels (gs-dbus and gs-netcat), permitting file transfers to traverse covert channels which can be not often monitored by safety tooling.

    Each features route visitors by a hardcoded GSocket rendezvous endpoint (62.171.153[.]47) and authenticate classes utilizing an operator‑provided token ($rsynccode). The obvious vacation spot (127.1:.) is deliberately deceptive. Nevertheless, it resembles a loopback deal with; the connection is intercepted by GSocket earlier than reaching the native networking stack, enabling distant file switch with out opening inbound ports or establishing seen outbound classes. This system permits the operator to exfiltrate knowledge even from hosts protected by restrictive firewall or egress filtering insurance policies.

    Two transport variants are supplied. The rs() perform leverages DBus‑based mostly tunneling (gs-dbus), favoring stealth in environments the place DBus visitors is frequent and barely inspected. The rs1() variant makes use of a netcat‑model GSocket tunnel (gs-netcat), providing greater throughput for bulk transfers at the price of barely elevated visibility. (See Determine 13)

    Figure 13 – Exfiltration over Covert Channel
    Determine 13 – Exfiltration over Covert Channel

    Each modes protect file permissions, timestamps, and partial switch state, indicating deliberate help for lengthy‑operating, interruption‑tolerant exfiltration workflows fairly than opportunistic knowledge theft.

    Lateral Motion

    For lateral motion, the malware performs automated discovery and brute-force makes an attempt in opposition to SSH companies by utilizing open-source instruments.

    • Rustscan, a contemporary port scanner used to determine reachable SSH endpoints (with configurable goal) and output the end in oG format (output Greppable), meant to be consumed by spirit. This serves as an assault floor for brute-force assaults.
    • Subsequent, it downloads & extracts spirit (one other penetration testing instrument) to the native listing, renames it to –bash, cleans up artifacts, & runs it to seize banners (to find out model data.) & brute-force SSH logins in opposition to hosts in h.lst utilizing default credentials. (See Determine 14)
    Figure 14 – Lateral movement via SSH Brute Force
    Determine 14 – Lateral motion by way of SSH Brute Pressure

    Built-in Evaluation

    The payload reveals a deliberate dual-layer design. The default runtime layer emphasizes reconnaissance, memory-only execution, stealth, and interactive management. The dormant, on-demand layer permits crypto-mining, privilege escalation, reminiscence theft, covert staging & exfiltration, lateral motion, and C2-driven updates, permitting operators to broaden influence opportunistically with out rising detection floor.

    Mixed with the loader’s fileless execution mannequin, this malware is optimized for long-term presence, operational flexibility, and defensive evasion. It isn’t attribute of commodity Linux malware; as a substitute, it displays a mature, multi-purpose post-exploitation framework constructed round interactive operator management.

    Conclusion

    Collectively, the loader and payload analyzed on this report exhibit a extremely mature Linux publish‑exploitation framework designed for stealth, flexibility, and long-term operator management.

    Quite than specializing in fast or apparent influence, the malware emphasizes situational consciousness, evasion of defenses, and the selective activation of capabilities based mostly on real-time operator judgment and environmental components.

    This conduct is uncommon for normal Linux malware. As an alternative, it reveals intentional design selections typical of superior intrusion instruments, prioritizing operational security, flexibility, and sturdiness over automation and scale.

    The framework’s complete safety evaluation, together with its fileless execution strategy, argument-driven modularity, and operator-controlled knowledge motion strategies, permits custom-made per-host operations whereas protecting a persistently low-profile execution atmosphere.

    The weaponization of the unique hackshell utility additional highlights this intent. Geared up with options for cryptomining, lateral motion instruments, exploit supply strategies, covert knowledge staging, and exfiltration primitives, together with aggressive OPSEC measures, the payload is clearly meant for long-term entry and focused monetization fairly than widespread distribution.

    Subsequently, efficient detection and disruption require visibility into in-memory execution, course of conduct, and kernel-level telemetry, as conventional file-based and signature-driven controls are unlikely to supply sufficient protection in opposition to the sort of menace.

    Cyble’s Risk Intelligence Platforms constantly monitor rising threats, phishing infrastructure, and malware exercise throughout the darkish internet, deep internet, and open sources. This proactive intelligence empowers organizations with early detection, model and area safety, infrastructure mapping, and attribution insights. Altogether, these capabilities present a vital head begin in mitigating and responding to evolving cyber threats.

    Our Suggestions

    We now have listed some important cybersecurity greatest practices that function the primary line of protection in opposition to attackers. We advocate that our readers observe the perfect practices given under:

    Defenders ought to prioritize behavioral detection over static signatures for staying protected in opposition to assaults like ShadowHS

    • Execution of ELF binaries from /proc//fd/
    • OpenSSL decryption invoked from shell or Perl pipelines reconstructing executables.
    • Full execution strings from bash‑reminiscence and Perl one‑liners invoking syscalls.
    • Shell scripts performing dependency validation for openssl, perl & gunzip.
    • In depth enumeration of /proc/*/exe for deleted or memfd-backed binaries
    • GDB is being invoked in opposition to stay processes for reminiscence dumping
    • PATH prefixed with . in interactive shells
    • Abuse of authentic synchronization or switch utilities over non‑customary execution transports for knowledge staging or exfiltration.
    • Monitor for argv spoofing anomalies the place executable path just isn’t equal to the cmdline identify & alert on memory-only processes, particularly interactive shells operating with out backing executables.
    • Monitor perl exec{} sample with nameless file descriptors.
    • Add guidelines for AES-CBC -nosalt misuse in shell pipelines.
    • Observe outbound knowledge transfers initiated by way of person‑area tunnels or non‑customary rsync transports.

    Cloud & Container Environments

    This framework explicitly checks for cloud brokers and monitoring instruments. In cloud-hosted Linux environments:

    • Deal with sudden /proc scanning and kernel module enumeration as high-risk
    • Monitor for SSH brute‑pressure or reconnaissance tooling launched publish‑compromise (e.g., rustscan, spirit)
    • Look ahead to GPU utilization spikes tied to hidden –bash-screen classes
    • Alert on knowledge motion from compute workloads utilizing atypical synchronization or tunnelling mechanisms.

    MITRE ATT&CK® Methods

    Tactic Approach ID Process
    Execution T1059.004 – Command and Scripting Interpreter: Unix Shell The loader and payload are applied totally in POSIX shell and Perl, enabling execution by customary shell interpreters with out introducing overseas binaries.
    Execution T1620 – Reflective Code Loading The payload is decrypted, decompressed, and executed instantly from reminiscence by way of nameless file descriptors below /proc//fd/, by no means touching disk.
    Protection Evasion T1036.005 – Masquerading: Match Respectable Identify or Location The payload spoofs argv[0] to match the loader script identify, inflicting course of listings and /proc//cmdline to resolve to a benign-looking script.
    Protection Evasion T1070 – Indicator Elimination on Host The payload aggressively disables shell historical past, cleans command artifacts, relocates HOME/TMPDIR, and avoids filesystem writes to attenuate forensic traces.
    Protection Evasion T1562.001 – Impair Defenses: Disable or Modify Instruments The framework detects EDR/AV tooling and exposes operator features that may terminate competing malware, miners, or defensive brokers.
    Discovery T1082 – System Info Discovery The payload collects OS, kernel, person classes, PTYs, and privilege context to tell operator decision-making throughout interactive entry.
    Discovery T1083 – File and Listing Discovery In depth inspection of /proc and system paths is carried out to enumerate executables, deleted binaries, and memory-backed artifacts.
    Discovery T1518.001 – Software program Discovery: Safety Software program The payload performs each path-based and service-based discovery for dozens of EDR, AV, cloud brokers, OT instruments, and log shippers.
    Discovery T1016.001 – Community Service Discovery Dormant scanning modules help SSH discovery and enumeration of reachable companies for potential lateral motion.
    Credential Entry T1555 – Credentials from Password Shops Reminiscence-dump routines current within the payload allow the extraction of credentials and secrets and techniques from stay processes when invoked by the operator.
    Lateral Motion T1021.004 – Distant Companies: SSH SSH-based entry and pivoting are supported, together with compelled use of legacy cryptographic algorithms to entry older infrastructure.
    Assortment T1005 – Knowledge from Native System Interactive operator instructions enable focused assortment of host knowledge, course of info, and delicate artifacts with out bulk exfiltration.
    Exfiltration   T1048.003 – Exfiltration Over Various Protocol Knowledge may be staged or exfiltrated utilizing authentic synchronization utilities over person‑area tunnels, avoiding conventional C2 channels.
    Impression T1496 – Useful resource Hijacking Dormant CPU/GPU mining modules may be activated on demand, supporting a number of miners and pool configurations.

    Indicators of Compromise (IOCs)

    Indicators Indicator Sort Description
    91.92.242[.]200 IPv4 Main payload staging infrastructure
    62.171.153[.]47 IPv4 Operator-controlled relay for exfiltration and post-compromise operations  
    20c1819c2fb886375d9504b0e7e5debb87ec9d1a53073b1f3f36dd6a6ac3f427 SHA-256 Essential obfuscated shell loader script
    9f2cfc65b480695aa2fd847db901e6b1135b5ed982d9942c61b629243d6830dd SHA-256 Customized weaponized hackshell payload
    148f199591b9a696197ec72f8edb0cf4f90c5dcad0805cfab4a660f65bf27ef3 SHA-256 RustScan port scanner
    574a17028b28fdf860e23754d16ede622e4e27bac11d33dbf5c39db501dfccdc SHA-256 spirit-x86_64.tgz archive
    3f014aa3e339d33760934f180915045daf922ca8ae07531c8e716608e683d92d SHA-256 spirit/-bash (UPX-packed binary)
    847846a0f0c76cf5699342a066378774f1101d2fb74850e3731dc9b74e12a69d SHA-256 spirit/-bash (unpacked Golang binary)
    5a6b08d42cc8296b32034b132bab18d201a48c1628df3200e869722506dd4ec6 SHA-256 gpu1/display miner wrapper
    e11bcba19ac628ae1d0b56e43646ae1b5da2ccc1da5162e6719d4b7d68d37096 SHA-256 gpu1/lol miner part
    0bb7d4d8a9c8f6b3622d07ae9892aa34dc2d0171209e2829d7d39d5024fd79ef SHA-256 xmr/xmrigremove.sh
    9fdaf64180b7d02b399d2a92f1cdd062af2e6584852ea597c50194b62cca3c0b SHA-256 gpustak/-bash binary
    b3ee445675fce1fccf365a7b681b316124b1a5f0a7e87042136e91776b187f39 SHA-256 gpustak/libxmrstak_cuda_backend.so CUDA backend
    5a6b08d42cc8296b32034b132bab18d201a48c1628df3200e869722506dd4ec6 SHA-256 gpustak/display miner wrapper
    5a6b08d42cc8296b32034b132bab18d201a48c1628df3200e869722506dd4ec6 SHA-256 gpuecho/display miner wrapper
    3ba88f92a87c0bb01b13754190c36d8af7cd047f738ebb3d6f975960fe7614d6 SHA-256 gpuecho/lol miner part
    5a6b08d42cc8296b32034b132bab18d201a48c1628df3200e869722506dd4ec6 SHA-256 gpu/display miner wrapper
    e11bcba19ac628ae1d0b56e43646ae1b5da2ccc1da5162e6719d4b7d68d37096 SHA-256 gpu/lol miner part
    4069eaadc94efb5be43b768c47d526e4c080b7d35b4c9e7eeb63b8dcf0038d7d SHA-256 ex/dirtycredz.x86_64 credential exploitation instrument
    72023e9829b0de93cf9f057858cac1bcd4a0499b018fb81406e08cd3053ae55b SHA-256 ex/payload.so shared object payload
    662d4e58e95b7b27eb961f3d81d299af961892c74bc7a1f2bb7a8f2442030d0e SHA-256 ex/overlay helper part
    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 SHA-256 ex/GCONV_PATH=./lol empty placeholder file
    c679b408275f9624602702f5601954f3b51efbb1acc505950ee88175854e783f SHA-256 ex/payload.c payload supply code
    666122c39b2fd4499678105420e21b938f0f62defdbc85275e14156ae69539d6 SHA-256 ex/blast exploitation utility
    8007b94d367b7dbacaac4c1da0305b489f0f3f7a38770dcdb68d5824fe33d041 SHA-256 ex/dp Soiled Pipe exploit
    072e08b38a18a00d75b139a5bbb18ac4aa891f4fd013b55bfd3d6747e1ba0a27 SHA-256 ex/ubu privilege escalation helper
    6c50fcf14af7f984a152016498bf4096dd1f71e9d35000301b8319bd50f7f6d0 SHA-256 ex/cve-2025-21756 exploit binary
    04a072481ebda2aa8f9e0dac371847f210199a503bf31950d796901d5dbe9d58 SHA-256 ex/traitor-x86_64 privilege escalation instrument
    19df5436972b330910f7cb9856ef5fb17320f50b6ced68a76faecddcafa7dcd7 SHA-256 ex/autoroot.sh automated root escalation script
    7fbab71fcc454401f6c3db91ed0afb0027266d5681c23900894f1002ceca389a SHA-256 ex/dirtypipe.x86_64 Soiled Pipe exploit variant
    e5a6deec56095d0ae702655ea2899c752f4a0735f9077605d933a04d45cd7e24 SHA-256 ex/dirtypagetable.x86_64 kernel exploitation instrument
    7361c6861fdb08cab819b13bf2327bc82eebdd70651c7de1aed18515c1700d97 SHA-256 ex/lol/gconv-modules GCONV-based exploitation part
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Why Monitoring Issues In 2026

    March 13, 2026

    Feds Dismantle SocksEscort Proxy Community Utilized in World Fraud

    March 13, 2026

    Why Stryker’s Outage Is a Catastrophe Restoration Wake-Up Name

    March 13, 2026
    Top Posts

    We Used 5 Outlier Detection Strategies on a Actual Dataset: They Disagreed on 96% of Flagged Samples

    March 13, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    We Used 5 Outlier Detection Strategies on a Actual Dataset: They Disagreed on 96% of Flagged Samples

    By Oliver ChambersMarch 13, 2026

    Picture by Writer   # Introduction   All tutorials on knowledge science make detecting outliers look…

    Key Capabilities and Pricing Defined

    March 13, 2026

    Why Monitoring Issues In 2026

    March 13, 2026

    Greatest Android Smartwatch for 2026

    March 13, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.