MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 078c22f167a9c4c734de6988c00338d1569402cf71d5c85809d768e5f358e8fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 20 File information Comments

SHA256 hash: 078c22f167a9c4c734de6988c00338d1569402cf71d5c85809d768e5f358e8fa
SHA3-384 hash: 8e6a16ab27e00297859710fe512250e9aebbcfed5d868e14fb090debc3b8cba66125cb520d7f993a3fd6a00d647aea87
SHA1 hash: a25cb451236902083b126d1433215929ed344324
MD5 hash: a77ebb5ec54a005127a1dd97e25dc514
humanhash: muppet-carolina-eight-vegan
File name:sysmonitor
Download: download sample
File size:15'384'724 bytes
First seen:2026-03-03 20:08:24 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 196608:VEcrBNHAHBE+R4JCVj3a59WKXxlG6EfweNOAKQzW:VEcrB9EiWKnveQ11
TLSH T10BF65BC3E8E21ED4C4EE8271D16A425BFA627C091B3823DB1690F7241F37BD4AA76751
telfhash t1c58200f05abc34f1a266c555e3b27474ea3728f527e478b04437bc92efd1e8409a6863
gimphash e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
28
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
crypto golang obfuscated
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
true
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
2
Number of processes launched:
4
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
Anti-VM
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=1fa066d1-1600-0000-e151-b6b74d0f0000 pid=3917 /usr/bin/sudo guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929 /tmp/sample.bin net write-file guuid=1fa066d1-1600-0000-e151-b6b74d0f0000 pid=3917->guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929 execve 185677ee-2bdf-5574-85aa-08f941c38074 64.89.161.144:25741 guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929->185677ee-2bdf-5574-85aa-08f941c38074 con guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3943 /tmp/sample.bin guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929->guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3943 clone guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3945 /tmp/sample.bin net send-data write-file guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929->guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3945 clone guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3946 /tmp/sample.bin dns net send-data write-file guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929->guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3946 clone guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3950 /tmp/sample.bin delete-file dns send-data write-file guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929->guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3950 clone guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=4515 /tmp/sample.bin guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3929->guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=4515 clone 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3945->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 84B 71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 api.ipify.org:443 guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3945->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 222B guuid=3353b173-1700-0000-e151-b6b75a110000 pid=4442 /tmp/sample.bin guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3945->guuid=3353b173-1700-0000-e151-b6b75a110000 pid=4442 clone guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443 /root/.harvest net send-data write-file zombie guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3945->guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443 execve guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3946->185677ee-2bdf-5574-85aa-08f941c38074 send: 212B guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3946->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 con 68a7a461-f335-5e13-8a25-6a1559e762a9 api.ipify.org:53 guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3946->68a7a461-f335-5e13-8a25-6a1559e762a9 con guuid=d9ba90d3-1600-0000-e151-b6b7590f0000 pid=3950->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 1550B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->185677ee-2bdf-5574-85aa-08f941c38074 con guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 84B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 481B d8d5b8d7-3dd0-5ca9-ae7f-a06611a39396 64.89.161.144:56154 guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->d8d5b8d7-3dd0-5ca9-ae7f-a06611a39396 con 27a2c641-6e4d-5f0c-9b8d-f214d518c2ce 64.89.161.144:58784 guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->27a2c641-6e4d-5f0c-9b8d-f214d518c2ce send: 931B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4459 /root/.harvest zombie guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4459 clone guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460 /root/.harvest net send-data write-file zombie guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460 clone guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461 /root/.harvest delete-file net send-data write-file zombie guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461 clone guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4462 /root/.harvest send-data write-file zombie guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4462 clone guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463 /root/.harvest dns net send-data write-config write-file zombie guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463 clone guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4981 /root/.harvest net send-data zombie guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4981 clone guuid=2b8241f8-1900-0000-e151-b6b7a6140000 pid=5286 /usr/bin/systemctl guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4443->guuid=2b8241f8-1900-0000-e151-b6b7a6140000 pid=5286 execve guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460->185677ee-2bdf-5574-85aa-08f941c38074 send: 220B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 185B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460->d8d5b8d7-3dd0-5ca9-ae7f-a06611a39396 send: 825B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460->27a2c641-6e4d-5f0c-9b8d-f214d518c2ce send: 2693B 4e6cece0-340d-557f-9184-d936d70bcff3 ipinfo.io:443 guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460->4e6cece0-340d-557f-9184-d936d70bcff3 send: 224B guuid=b192af69-1f00-0000-e151-b6b7d4140000 pid=5332 /usr/sbin/chpasswd write-config guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4460->guuid=b192af69-1f00-0000-e151-b6b7d4140000 pid=5332 execve guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 76B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 74B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461->27a2c641-6e4d-5f0c-9b8d-f214d518c2ce send: 902B 8487420e-c65f-5e1c-9e07-158731969cab 64.89.161.144:34675 guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461->8487420e-c65f-5e1c-9e07-158731969cab send: 343B guuid=63afd97e-1700-0000-e151-b6b77c110000 pid=4476 /root/.harvest guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461->guuid=63afd97e-1700-0000-e151-b6b77c110000 pid=4476 clone guuid=2f1ded7e-1700-0000-e151-b6b77d110000 pid=4477 /usr/bin/lspci guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461->guuid=2f1ded7e-1700-0000-e151-b6b77d110000 pid=4477 execve guuid=006e941d-1a00-0000-e151-b6b7ac140000 pid=5292 /usr/bin/systemctl guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4461->guuid=006e941d-1a00-0000-e151-b6b7ac140000 pid=5292 execve guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4462->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 74B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4462->27a2c641-6e4d-5f0c-9b8d-f214d518c2ce send: 290B guuid=f75aa93f-1900-0000-e151-b6b78a140000 pid=5258 /usr/bin/systemctl guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4462->guuid=f75aa93f-1900-0000-e151-b6b78a140000 pid=5258 execve guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 1883B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463->68a7a461-f335-5e13-8a25-6a1559e762a9 con guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463->d8d5b8d7-3dd0-5ca9-ae7f-a06611a39396 send: 550B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463->27a2c641-6e4d-5f0c-9b8d-f214d518c2ce send: 1199B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463->4e6cece0-340d-557f-9184-d936d70bcff3 send: 1585B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463->8487420e-c65f-5e1c-9e07-158731969cab con guuid=6912e7d3-1800-0000-e151-b6b775140000 pid=5237 /usr/bin/systemctl guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4463->guuid=6912e7d3-1800-0000-e151-b6b775140000 pid=5237 execve guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4981->71d5fbeb-6e3e-587d-bea9-4cc9e23c5081 send: 74B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4981->d8d5b8d7-3dd0-5ca9-ae7f-a06611a39396 send: 825B guuid=b789b673-1700-0000-e151-b6b75b110000 pid=4981->27a2c641-6e4d-5f0c-9b8d-f214d518c2ce send: 935B guuid=881bba6e-1f00-0000-e151-b6b7d5140000 pid=5333 /usr/sbin/chpasswd guuid=b192af69-1f00-0000-e151-b6b7d4140000 pid=5332->guuid=881bba6e-1f00-0000-e151-b6b7d5140000 pid=5333 clone guuid=b682ed6e-1f00-0000-e151-b6b7d6140000 pid=5334 /usr/sbin/chpasswd guuid=b192af69-1f00-0000-e151-b6b7d4140000 pid=5332->guuid=b682ed6e-1f00-0000-e151-b6b7d6140000 pid=5334 clone
Result
Threat name:
Detection:
malicious
Classification:
troj.evad.mine
Score:
92 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Detected Stratum mining protocol
Drops invisible ELF files
Found strings related to Crypto-Mining
Found Tor onion address
Malicious sample detected (through community Yara rule)
Sample deletes itself
Tries to load the MSR kernel module used for reading/writing to CPUs model specific register
Uses known network protocols on non-standard ports
Writes to CPU model specific registers (MSR) (e.g. miners improve performance by disabling HW prefetcher)
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1877837 Sample: sysmonitor.elf Startdate: 03/03/2026 Architecture: LINUX Score: 92 52 104.243.43.115 RELIABLESITEUS United States 2->52 54 31.56.178.201 RASANAIR Iran (ISLAMIC Republic Of) 2->54 56 14 other IPs or domains 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Yara detected Xmrig cryptocurrency miner 2->60 62 Connects to many ports of the same IP (likely port scanning) 2->62 64 4 other signatures 2->64 9 sysmonitor.elf 2->9         started        13 systemd smartd 2->13         started        15 systemd snapd-env-generator 2->15         started        17 4 other processes 2->17 signatures3 process4 file5 48 /root/.harvest, ELF 9->48 dropped 70 Drops invisible ELF files 9->70 19 sysmonitor.elf .harvest 9->19         started        23 sysmonitor.elf 9->23         started        50 /var/tmp/3449686849, ELF 13->50 dropped 25 smartd 3449686849 13->25         started        27 smartd 13->27         started        signatures6 process7 file8 46 /usr/local/bin/smartd, ELF 19->46 dropped 66 Sample deletes itself 19->66 29 .harvest chpasswd 19->29         started        31 .harvest lspci 19->31         started        33 .harvest systemctl 19->33         started        37 4 other processes 19->37 68 Writes to CPU model specific registers (MSR) (e.g. miners improve performance by disabling HW prefetcher) 25->68 35 3449686849 sh 25->35         started        signatures9 process10 process11 39 chpasswd 29->39         started        41 chpasswd 29->41         started        43 sh modprobe 35->43         started        signatures12 72 Tries to load the MSR kernel module used for reading/writing to CPUs model specific register 43->72
Gathering data
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery linux
Behaviour
GoLang User-Agent
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Looks up external IP address via web service
Deletes itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Detect_Go_GOMAXPROCS
Author:Obscurity Labs LLC
Description:Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata
Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:enterpriseunix2
Author:Tim Brown @timb_machine
Description:Enterprise UNIX
Rule name:GoBinTest
Rule name:golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_duffcopy_amd64
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:telebot_framework
Author:vietdx.mb
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 078c22f167a9c4c734de6988c00338d1569402cf71d5c85809d768e5f358e8fa

(this sample)

  
Delivery method
Distributed via web download

Comments