MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 03072f8238e394a7326325353d9fbd389a77d90dc7bcb67ca840bb310e344ab6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 03072f8238e394a7326325353d9fbd389a77d90dc7bcb67ca840bb310e344ab6
SHA3-384 hash: 455f175ed15a9024b1b3096fbdfd56ed299c74de33c8edae52e3f76ea709400297dfb31f83a607cd9fabd11417db3a96
SHA1 hash: bc0983a9c2170d4907cbfa100eb85cf544bb06a8
MD5 hash: c2046ccd9cb78429c54f0edd144a9b11
humanhash: failed-iowa-mexico-one
File name:gb
Download: download sample
File size:20'216 bytes
First seen:2025-12-30 21:48:44 UTC
Last seen:2025-12-31 19:18:46 UTC
File type: elf
MIME type:application/x-sharedlib
ssdeep 384:1k30en0Xvn/3PHfXvn/3PHfayqC65NaWtJJeZcwAX/FNGuf9aV4d1S:1M/0Xvn/3PHfXvn/3PHfayqC65PJsFAu
TLSH T17292F90E9290DA7DD89CF2758DDB543166B1F070B3B2222F6B80663A6EE3304473AD65
telfhash t16da01242003401604ec396d448a307470003c920f59412400f98d514c13471f220ae4f
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
3
# of downloads :
28
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
gcc
Verdict:
Clean
File Type:
elf.64.le
First seen:
2025-12-30T19:07:00Z UTC
Last seen:
2025-12-30T19:50:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=2b2fdcf2-2000-0000-85c7-04dc7a0b0000 pid=2938 /usr/bin/sudo guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944 /usr/bin/bash guuid=2b2fdcf2-2000-0000-85c7-04dc7a0b0000 pid=2938->guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944 execve guuid=934da3f6-2000-0000-85c7-04dc830b0000 pid=2947 /usr/bin/bash guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=934da3f6-2000-0000-85c7-04dc830b0000 pid=2947 clone guuid=171049f7-2000-0000-85c7-04dc860b0000 pid=2950 /usr/bin/mkdir guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=171049f7-2000-0000-85c7-04dc860b0000 pid=2950 execve guuid=e45ab3f7-2000-0000-85c7-04dc870b0000 pid=2951 /usr/bin/bash guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=e45ab3f7-2000-0000-85c7-04dc870b0000 pid=2951 clone guuid=bc9edff7-2000-0000-85c7-04dc880b0000 pid=2952 /usr/bin/busybox net send-data write-file guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=bc9edff7-2000-0000-85c7-04dc880b0000 pid=2952 execve guuid=8b9611fc-2000-0000-85c7-04dc920b0000 pid=2962 /usr/bin/chmod guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=8b9611fc-2000-0000-85c7-04dc920b0000 pid=2962 execve guuid=0a2e6efc-2000-0000-85c7-04dc940b0000 pid=2964 /root/.tmp_dj/dj.x86_64 net guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=0a2e6efc-2000-0000-85c7-04dc940b0000 pid=2964 execve guuid=988e9dfc-2000-0000-85c7-04dc990b0000 pid=2969 /usr/bin/rm delete-file guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=988e9dfc-2000-0000-85c7-04dc990b0000 pid=2969 execve guuid=e08458fd-2000-0000-85c7-04dc9d0b0000 pid=2973 /usr/bin/rmdir guuid=4ba1c3f5-2000-0000-85c7-04dc800b0000 pid=2944->guuid=e08458fd-2000-0000-85c7-04dc9d0b0000 pid=2973 execve guuid=701ac7f6-2000-0000-85c7-04dc840b0000 pid=2948 /usr/bin/uname guuid=934da3f6-2000-0000-85c7-04dc830b0000 pid=2947->guuid=701ac7f6-2000-0000-85c7-04dc840b0000 pid=2948 execve d9db81a5-4229-5ecf-8d47-59af2d1108c6 176.65.148.41:80 guuid=bc9edff7-2000-0000-85c7-04dc880b0000 pid=2952->d9db81a5-4229-5ecf-8d47-59af2d1108c6 send: 88B 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=0a2e6efc-2000-0000-85c7-04dc940b0000 pid=2964->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=0bb987fc-2000-0000-85c7-04dc950b0000 pid=2965 /root/.tmp_dj/dj.x86_64 guuid=0a2e6efc-2000-0000-85c7-04dc940b0000 pid=2964->guuid=0bb987fc-2000-0000-85c7-04dc950b0000 pid=2965 clone guuid=ccf68afc-2000-0000-85c7-04dc960b0000 pid=2966 /root/.tmp_dj/dj.x86_64 dns net send-data zombie guuid=0a2e6efc-2000-0000-85c7-04dc940b0000 pid=2964->guuid=ccf68afc-2000-0000-85c7-04dc960b0000 pid=2966 clone guuid=ccf68afc-2000-0000-85c7-04dc960b0000 pid=2966->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 send: 330B c407aada-1f58-521e-84c2-41afe4f4bae6 www.id888.pw:60195 guuid=ccf68afc-2000-0000-85c7-04dc960b0000 pid=2966->c407aada-1f58-521e-84c2-41afe4f4bae6 con guuid=f3dc99fc-2000-0000-85c7-04dc970b0000 pid=2967 /root/.tmp_dj/dj.x86_64 guuid=ccf68afc-2000-0000-85c7-04dc960b0000 pid=2966->guuid=f3dc99fc-2000-0000-85c7-04dc970b0000 pid=2967 clone guuid=2de99cfc-2000-0000-85c7-04dc980b0000 pid=2968 /root/.tmp_dj/dj.x86_64 guuid=ccf68afc-2000-0000-85c7-04dc960b0000 pid=2966->guuid=2de99cfc-2000-0000-85c7-04dc980b0000 pid=2968 clone
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
1 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-12-30 21:49:14 UTC
File Type:
ELF64 Little (SO)
AV detection:
3 of 24 (12.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Verdict:
Unknown
Tags:
red_team_tool
YARA:
hacktool_shc
Malware family:
ShellScriptCompiler
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 03072f8238e394a7326325353d9fbd389a77d90dc7bcb67ca840bb310e344ab6

(this sample)

  
Delivery method
Distributed via web download

Comments