MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1361a1395684bf9601dee6a051b0a0e71d5d86fc3ff7cb62668a209e6aab7bf2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 1361a1395684bf9601dee6a051b0a0e71d5d86fc3ff7cb62668a209e6aab7bf2
SHA3-384 hash: 5c1bec0174a6808b56a5f3ecb67c812cc8b1f43edc924f3919dc7875a5db4a08ed5365925b79fb6653b4022cb4dceb22
SHA1 hash: fb080f527d884dbaafb90ec9b546a4270affcf59
MD5 hash: 66c276ffed950c89b1cc30e48b0122c2
humanhash: bakerloo-enemy-hawaii-bravo
File name:dlr.arm4
Download: download sample
File size:1'164 bytes
First seen:2026-02-01 07:29:33 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 24:FnJ/0vRVCO8DTuJ2x4BDclaGjFcsLFdIdmF5vj2IOkVNfDm:ZJcCO8Dak4BAoGjFLLZ2IOkVNbm
TLSH T18A21CEA667E2AD57CC640337DD9B5710A322EBC8C28FB123F74212170C2F22A4F12445
telfhash t1c1900264428f44e89b850241a04a65018ec4f3231225285016c0484055033106045141
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
29
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=a7275b77-2000-0000-9948-4ffbea080000 pid=2282 /usr/bin/sudo guuid=6ce3af79-2000-0000-9948-4ffbeb080000 pid=2283 /tmp/sample.bin guuid=a7275b77-2000-0000-9948-4ffbea080000 pid=2282->guuid=6ce3af79-2000-0000-9948-4ffbeb080000 pid=2283 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Linux.Downloader.Mirai
Status:
Malicious
First seen:
2026-02-01 07:17:04 UTC
File Type:
ELF32 Little (Exe)
AV detection:
16 of 36 (44.44%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 1361a1395684bf9601dee6a051b0a0e71d5d86fc3ff7cb62668a209e6aab7bf2

(this sample)

  
Delivery method
Distributed via web download

Comments