MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 04b86bbbc07c8c8e2d0de5bbe626c9676dabe33787bd599a234c56812edb4533. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 04b86bbbc07c8c8e2d0de5bbe626c9676dabe33787bd599a234c56812edb4533
SHA3-384 hash: 0693a5490c88480030aafabd3a80566d5cf58a8b7243eab1f5a5049e75f7f2d2a91b96e1084ee7c995d4b1c1d59c1bc4
SHA1 hash: 79db514450eff697c3e632792a153e03a64b2919
MD5 hash: f2e6dc5d8647532392297031f6283567
humanhash: spring-bacon-venus-eight
File name:aarch64
Download: download sample
File size:509'896 bytes
First seen:2025-06-23 11:58:39 UTC
Last seen:2025-06-24 09:40:01 UTC
File type: elf
MIME type:application/x-executable
ssdeep 6144:O/izeB+/ow3gK2lc5bvyI0vOHD6BZkDgn358cIF3RI5HkdY1FP98/8ecjfP:3BohHKTyfvOHD6ByD4WcIMkuDmEesP
TLSH T1CCB41228EE4E38C1F3D1E3B8DA0A4BB1B05B79D0D166C1B2BA41E25D95EDDDEC5D0212
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
2
# of downloads :
68
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creates directories
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
false
Architecture:
arm
Packer:
custom
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.123:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 89.207.71.47:6881
type: 176.125.139.123:6881
type: 188.42.55.92:6881
type: 178.141.47.71:6881
type: 161.53.29.208:6881
type: 94.198.234.219:6881
type: 182.105.188.18:6881
type: 112.87.174.32:6881
type: 223.17.144.203:6881
type: 119.147.123.30:6881
type: 94.190.40.30:6881
type: 61.144.106.67:6881
type: 82.66.146.26:6881
type: 79.0.43.114:6881
type: 93.119.18.9:6881
type: 177.124.123.91:6881
type: 62.90.219.1:6881
type: 58.188.93.144:6881
type: 178.69.209.93:6881
type: 102.119.32.30:6881
type: 91.9.244.67:6881
type: 84.175.49.77:6881
type: 49.37.128.252:6881
type: 75.119.138.164:6881
type: 5.135.138.137:6881
type: 31.129.8.161:6881
type: 107.181.234.235:6881
type: 86.38.200.129:6881
type: 200.175.188.50:6881
type: 47.199.253.134:6881
type: 91.64.42.212:6881
type: 84.226.240.58:6881
type: 103.161.64.2:6881
type: 130.239.18.158:8539
type: 178.162.174.178:28003
type: 178.162.174.227:28003
type: 178.162.174.233:28003
type: 178.162.173.231:28001
type: 178.162.173.14:28001
type: 95.168.162.161:42670
type: 173.230.130.111:6880
type: 45.203.154.94:6880
type: 195.137.220.207:6880
type: 178.162.173.160:28013
type: 178.162.173.145:28016
type: 195.154.185.217:25051
type: 178.162.173.154:28010
type: 178.162.173.199:28010
type: 195.154.185.217:24155
type: 212.7.202.40:28030
type: 46.232.211.167:13109
type: 81.157.67.94:51413
type: 51.15.171.31:51413
type: 185.72.117.60:51413
type: 185.100.232.154:51413
type: 156.34.215.247:51413
type: 173.249.30.49:51413
type: 95.216.24.146:51413
type: 220.107.37.1:51413
type: 77.75.10.50:51413
type: 109.160.122.210:51413
type: 114.249.25.220:51413
type: 130.239.18.158:8515
type: 46.232.210.43:59944
type: 78.58.203.10:6889
type: 58.241.139.242:6889
type: 153.218.58.103:6889
type: 87.26.177.198:6889
type: 178.162.174.65:28006
type: 5.196.7.57:50722
type: 37.27.120.51:50000
type: 142.132.206.120:50000
type: 159.69.143.182:50000
type: 142.132.203.56:50000
type: 162.55.82.239:50000
type: 81.171.7.65:28007
type: 15.235.82.46:47265
type: 36.255.4.34:32715
type: 89.67.73.128:8083
type: 212.57.136.124:8083
type: 51.159.54.94:32546
type: 113.254.195.76:46882
type: 72.49.104.172:35519
type: 122.100.211.25:7107
type: 61.19.199.13:57318
type: 83.97.152.63:57437
type: 189.175.13.148:6882
type: 188.165.201.82:6882
type: 160.248.23.109:13642
type: 141.147.94.88:34937
type: 178.162.174.99:28009
type: 112.118.33.249:16596
type: 45.152.210.120:8999
type: 142.160.28.58:8999
type: 172.83.159.97:8999
type: 141.95.53.34:8650
type: 94.31.111.176:16881
type: 91.199.227.102:10274
type: 217.43.122.214:25444
type: 123.195.34.21:7725
type: 95.211.138.114:28014
type: 94.75.194.118:28014
type: 95.168.162.195:48538
type: 124.5.100.246:7856
type: 178.162.174.1:28012
type: 119.193.204.72:11204
type: 130.239.18.158:8510
type: 89.169.48.127:25345
type: 84.208.80.224:14519
type: 92.203.29.97:10992
type: 93.35.192.225:18102
type: 80.122.204.142:21867
type: 185.203.56.51:12996
type: 218.149.178.246:32771
type: 46.232.211.174:64217
type: 59.3.200.173:33123
type: 87.249.182.160:37692
type: 125.178.177.137:63664
type: 189.28.187.91:4995
type: 61.92.98.205:7826
type: 138.64.199.122:24026
type: 186.86.52.17:9526
type: 5.135.178.41:51941
type: 24.236.221.214:15694
type: 186.122.10.168:46529
type: 188.51.238.102:27038
type: 190.47.216.21:45315
type: 157.131.69.241:51415
type: 70.52.217.234:49698
type: 220.71.34.187:37453
type: 180.80.200.67:51947
type: 122.150.244.17:13388
type: 186.122.2.36:54247
type: 178.54.165.184:43214
type: 87.16.5.31:6888
type: 176.63.7.83:35307
type: 88.98.111.6:3567
type: 185.235.231.184:20483
type: 197.145.157.136:45030
type: 218.236.142.218:20018
type: 144.76.175.153:51871
type: 104.228.12.195:54604
type: 88.243.158.93:56019
type: 176.133.75.134:35700
type: 187.184.179.6:2515
type: 175.194.65.110:7603
type: 89.243.85.39:42963
type: 165.73.111.236:50694
type: 54.209.131.199:6892
type: 95.214.53.172:1688
type: 221.197.243.248:15000
type: 117.140.175.205:15000
type: 112.238.60.3:15000
type: 180.165.29.213:15000
type: 114.225.218.27:15000
type: 41.116.7.185:26855
type: 66.70.178.54:14701
type: 188.165.198.46:57615
type: 24.191.177.77:58734
type: 149.56.27.121:58813
type: 122.151.215.59:6100
type: 54.39.52.183:37249
type: 178.162.174.73:28005
type: 211.209.61.68:46993
type: 219.104.115.6:25341
type: 152.53.104.128:10240
type: 89.22.226.106:6936
type: 37.27.113.233:57540
type: 37.48.95.6:45260
type: 112.118.69.235:10390
type: 115.164.84.181:31874
type: 116.82.210.50:17646
type: 90.199.229.76:27472
type: 102.208.237.124:11570
type: 45.152.209.251:54413
type: 188.252.198.170:8416
type: 185.21.217.11:60210
type: 185.21.216.186:60745
type: 46.232.210.200:23359
type: 83.149.98.184:28008
type: 222.119.37.60:53330
type: 65.108.143.34:36639
type: 188.165.198.24:54539
type: 195.154.172.179:28680
Status:
terminated
Behavior Graph:
%3 guuid=c1364fb2-1900-0000-db88-85d7bb0a0000 pid=2747 /usr/bin/sudo guuid=8aaf41b4-1900-0000-db88-85d7c10a0000 pid=2753 /tmp/sample.bin guuid=c1364fb2-1900-0000-db88-85d7bb0a0000 pid=2747->guuid=8aaf41b4-1900-0000-db88-85d7c10a0000 pid=2753 execve guuid=845b0eb5-1900-0000-db88-85d7c50a0000 pid=2757 /usr/bin/dash guuid=8aaf41b4-1900-0000-db88-85d7c10a0000 pid=2753->guuid=845b0eb5-1900-0000-db88-85d7c50a0000 pid=2757 clone guuid=64bd64b5-1900-0000-db88-85d7c60a0000 pid=2758 /usr/bin/dash guuid=8aaf41b4-1900-0000-db88-85d7c10a0000 pid=2753->guuid=64bd64b5-1900-0000-db88-85d7c60a0000 pid=2758 clone guuid=20b09db5-1900-0000-db88-85d7c70a0000 pid=2759 /usr/bin/dash guuid=8aaf41b4-1900-0000-db88-85d7c10a0000 pid=2753->guuid=20b09db5-1900-0000-db88-85d7c70a0000 pid=2759 clone guuid=10c3b2b5-1900-0000-db88-85d7c80a0000 pid=2760 /usr/bin/dash guuid=8aaf41b4-1900-0000-db88-85d7c10a0000 pid=2753->guuid=10c3b2b5-1900-0000-db88-85d7c80a0000 pid=2760 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw
Score:
68 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1720886 Sample: aarch64.elf Startdate: 23/06/2025 Architecture: LINUX Score: 68 42 154.16.81.181, 21924, 37951, 38726 ASDETUKhttpwwwheficedcomGB South Africa 2->42 44 103.142.108.33, 3062 WORLDPHONE-INASNumberforInterdomainRoutingIN India 2->44 46 101 other IPs or domains 2->46 54 Multi AV Scanner detection for submitted file 2->54 56 Connects to many ports of the same IP (likely port scanning) 2->56 10 aarch64.elf 2->10         started        12 dash rm 2->12         started        14 dash rm 2->14         started        signatures3 process4 process5 16 aarch64.elf sh 10->16         started        18 aarch64.elf 10->18         started        21 aarch64.elf sh 10->21         started        signatures6 23 sh crontab 16->23         started        27 sh 16->27         started        50 Opens /sys/class/net/* files useful for querying network interface information 18->50 52 Sample reads /proc/mounts (often used for finding a writable filesystem) 18->52 29 aarch64.elf 18->29         started        31 sh crontab 21->31         started        process7 file8 40 /var/spool/cron/crontabs/tmp.B4QJDY, ASCII 23->40 dropped 58 Sample tries to persist itself using cron 23->58 60 Executes the "crontab" command typically for achieving persistence 23->60 33 sh crontab 27->33         started        36 aarch64.elf 29->36         started        signatures9 process10 signatures11 48 Executes the "crontab" command typically for achieving persistence 33->48 38 aarch64.elf 36->38         started        process12
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-06-23 11:59:35 UTC
File Type:
ELF64 Little (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 04b86bbbc07c8c8e2d0de5bbe626c9676dabe33787bd599a234c56812edb4533

(this sample)

  
Delivery method
Distributed via web download

Comments