MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1234978ed17b64813372138d8ae5fb0c02515a342b7cc4a91d8e4072f3b4033f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | 1234978ed17b64813372138d8ae5fb0c02515a342b7cc4a91d8e4072f3b4033f |
|---|---|
| SHA3-384 hash: | 2595d8fe7bfefc658102eb62ce86105bfe3bb4846b3b338b4fd5a3982fe9fbb56ea9b1f3855c1e73ac5ea9ed18334a1c |
| SHA1 hash: | 2bc18c99de845e785b2421408e3ce3c66fd6f30f |
| MD5 hash: | a6ad2bd2e8ce4589c7855356f22f7a6f |
| humanhash: | kentucky-five-april-ten |
| File name: | ethd0 |
| Download: | download sample |
| File size: | 2'444'332 bytes |
| First seen: | 2026-02-18 18:59:25 UTC |
| Last seen: | 2026-02-18 22:23:22 UTC |
| File type: | elf |
| MIME type: | application/x-executable |
| ssdeep | 49152:BYu4FteYqzDCmq+L7t+TDG67RsT3sqIiS9y2/GUvNSrm:LmUYqzVqIOGWijIiMz//vNSi |
| TLSH | T1D8B53397455CF921B62C0C38C3C992CA7E196CD3D14B1861B920219F5EF2BDB3B791AE |
| TrID | 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12) 49.8% (.O) ELF Executable and Linkable format (generic) (4000/1) |
| Magika | elf |
| Reporter | |
| Tags: | elf UPX |
UPX packed
This file is packed with UPX. We have therefore unpacked the file. Below is furhter information about the unpacked (de-compressed) file.
| File size (compressed) : | 2'444'332 bytes |
|---|---|
| File size (de-compressed) : | 8'423'400 bytes |
| Format: | linux/amd64 |
| Unpacked file: | a016ae8260ad5ba3a1beab945c741b04c999ca3e57a611e2bf82af64197e9a00 |
Intelligence
File Origin
# of uploads :
2
# of downloads :
59
Origin country :
DEVendor Threat Intelligence
No detections
Verdict:
Unknown
Threat level:
0/10
Confidence:
100%
Tags:
anti-vm crypto packed upx
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
UPX
Botnet:
unknown
Number of open files:
63
Number of processes launched:
13
Processes remaning?
false
Remote TCP ports scanned:
not identified
Full report:
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
Verdict:
Unknown
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj
Score:
48 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
ELF
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
6/10
Tags:
discovery execution linux persistence privilege_escalation upx
Behaviour
GoLang User-Agent
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Reads CPU attributes
Creates/modifies Cron job
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.29
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
elf 1234978ed17b64813372138d8ae5fb0c02515a342b7cc4a91d8e4072f3b4033f
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.