MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1821cb62914a9f3bc33840abf1f93c768701df52c400105ee01c258a06dfe7a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 1821cb62914a9f3bc33840abf1f93c768701df52c400105ee01c258a06dfe7a5
SHA3-384 hash: a2f7c57ee0a04641ff7f433cf34a7da6490289ab77dfd5c7985f1d86596e7832aa855b00a8953d03be718b5daed5676c
SHA1 hash: f7a6e6c2987ab281cc75c8d033e2b99617a05692
MD5 hash: 78bdda706a1d99802fa3c9c3d19460d4
humanhash: violet-gee-maine-six
File name:mips
Download: download sample
File size:592'688 bytes
First seen:2025-06-30 17:17:45 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 12288:M57U0INmdtgOcyJXDOMzf03gdvZ/yCnEI7zD:W7v+mrY2xzf03yvZ/YIj
TLSH T131C4F1A377204F90C35195B209F389335AF6199706F39982537DEE107F20A68386BFE9
telfhash t10ab0011070740bb84308e12d5cdcae5679f20cc3fe470c27db6047a159b54434d00d18
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Sends data to a server
Changes the time when the file was created, accessed, or modified
Opens a port
DNS request
Connection attempt
Locks files
Changes access rights for a written file
Creating a process from a recently created file
Launching a process
Receives data from a server
Creates directories
Runs as daemon
Creates or modifies files in /cron to set up autorun
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
exploit gcc lolbin remote
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
true
Architecture:
mips
Packer:
custom
Botnet:
unknown
Number of open files:
60
Number of processes launched:
10
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
Anti-VM
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.123:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 84.28.2.133:6881
type: 77.245.214.177:6881
type: 176.125.139.123:6881
type: 178.71.161.38:6881
type: 93.123.160.14:6881
type: 89.207.71.47:6881
type: 188.42.55.92:6881
type: 37.192.158.93:6881
type: 82.19.138.69:6881
type: 88.101.93.63:6881
type: 188.16.58.121:6881
type: 79.231.117.200:6881
type: 148.103.106.223:6881
type: 211.218.214.56:6881
type: 54.214.62.55:6881
type: 54.214.62.31:6881
type: 186.52.126.181:6881
type: 54.214.105.212:6881
type: 178.132.4.27:6881
type: 35.163.251.58:6881
type: 82.209.249.120:6881
type: 18.191.2.28:6881
type: 54.70.28.180:6881
type: 207.188.143.184:6881
type: 31.170.175.36:6881
type: 178.215.232.114:6881
type: 18.221.7.72:6881
type: 60.76.61.227:6881
type: 23.88.96.103:6881
type: 24.168.83.2:6881
type: 93.174.177.210:6881
type: 130.239.18.158:8516
type: 140.245.76.181:9081
type: 178.162.173.91:28003
type: 178.162.174.178:28003
type: 178.162.173.48:28003
type: 178.162.173.32:28003
type: 195.154.233.74:6880
type: 3.130.60.88:6880
type: 173.230.130.111:6880
type: 54.144.88.168:6880
type: 185.196.61.129:6880
type: 18.188.239.31:6880
type: 154.202.133.136:6880
type: 45.203.206.54:6880
type: 148.153.188.242:6880
type: 3.228.205.146:6880
type: 52.70.34.253:6880
type: 18.119.148.203:6880
type: 130.239.18.158:8580
type: 130.239.18.158:8513
type: 163.172.38.214:51413
type: 151.80.44.142:51413
type: 203.12.14.33:51413
type: 104.244.73.2:51413
type: 163.172.217.80:51413
type: 176.111.99.242:51413
type: 31.151.58.140:51413
type: 188.25.72.114:51413
type: 91.135.14.53:51413
type: 64.118.248.36:51413
type: 37.187.125.69:51413
type: 158.174.115.143:51413
type: 164.132.45.198:51413
type: 94.75.193.172:51413
type: 5.79.105.23:51413
type: 5.39.82.149:51413
type: 45.91.208.118:51413
type: 173.230.137.213:51413
type: 130.239.18.158:8531
type: 178.162.174.168:28012
type: 178.162.173.160:28012
type: 46.232.211.120:19109
type: 178.162.173.231:28001
type: 5.79.73.138:28001
type: 178.162.173.169:28001
type: 178.162.173.228:28001
type: 178.162.174.76:28002
type: 178.162.174.163:28002
type: 178.162.173.147:28002
type: 178.162.173.194:28002
type: 95.211.216.167:28002
type: 89.149.202.17:28002
type: 154.60.90.83:21194
type: 133.32.128.118:7591
type: 69.50.95.40:12005
type: 45.155.90.234:12538
type: 46.232.211.150:11759
type: 37.27.119.118:50000
type: 65.108.198.44:50000
type: 37.27.104.56:50000
type: 135.181.238.57:50000
type: 148.251.90.51:50000
type: 61.178.18.254:50000
type: 178.162.174.8:28009
type: 85.17.170.48:28009
type: 178.162.174.229:28009
type: 69.50.95.40:12096
type: 31.220.98.19:17238
type: 185.203.56.49:22887
type: 124.244.233.97:22068
type: 220.246.76.166:12943
type: 178.162.173.138:28010
type: 178.162.174.226:28010
type: 178.162.173.117:28010
type: 178.162.173.103:28010
type: 163.172.13.241:58761
type: 130.239.18.158:8508
type: 178.162.173.220:28014
type: 178.162.173.40:28014
type: 178.162.174.88:28014
type: 5.79.80.223:28014
type: 46.232.211.190:13709
type: 5.61.167.19:48953
type: 95.211.247.106:28016
type: 130.239.18.158:8565
type: 5.135.156.163:56843
type: 185.149.91.21:51118
type: 130.239.18.158:8520
type: 212.7.202.40:28030
type: 178.162.173.98:28000
type: 178.162.173.66:28000
type: 95.168.162.161:42670
type: 130.239.18.158:8539
type: 152.228.162.85:42435
type: 195.154.172.179:27126
type: 212.7.202.40:28011
type: 178.162.173.134:28011
type: 137.184.226.118:56333
type: 213.227.153.16:28005
type: 178.162.173.111:28005
type: 178.162.174.236:28005
type: 178.162.173.203:28005
type: 178.162.173.24:28007
type: 178.162.173.147:28007
type: 178.162.173.164:28007
type: 51.159.104.68:7606
type: 95.211.20.1:21170
type: 81.171.22.205:28013
type: 178.162.173.138:28013
type: 106.146.237.32:22596
type: 94.249.91.145:57316
type: 78.63.100.13:24803
type: 46.232.210.50:15759
type: 46.232.211.180:51539
type: 178.162.173.149:28004
type: 178.162.173.231:28004
type: 37.45.52.170:1024
type: 46.127.160.214:1024
type: 188.163.8.4:47332
type: 189.63.40.151:7959
type: 109.201.152.162:33405
type: 5.79.98.151:49369
type: 195.154.170.6:8650
type: 217.12.150.142:60069
type: 49.48.85.114:21784
type: 45.87.250.184:54058
type: 51.159.104.74:7014
type: 111.220.207.233:49001
type: 109.229.106.79:49001
type: 95.161.239.56:49001
type: 138.199.29.48:36056
type: 54.211.14.111:6882
type: 5.137.115.39:6882
type: 175.110.115.46:6882
type: 93.103.83.224:56379
type: 38.225.100.135:48181
type: 5.39.85.155:53591
type: 185.203.56.51:11448
type: 183.180.176.34:38638
type: 72.21.17.54:52084
type: 84.143.109.238:33735
type: 46.22.62.88:23810
type: 169.150.223.223:15259
type: 31.10.157.1:54005
type: 176.140.252.182:55241
type: 121.111.130.33:14708
type: 93.44.139.8:16522
type: 195.154.185.217:27975
type: 186.193.183.209:37503
type: 5.255.113.79:54986
type: 195.154.172.179:27288
type: 59.138.111.233:13581
type: 111.217.155.107:10728
type: 183.83.154.224:14371
type: 82.35.247.242:38837
type: 186.205.22.104:15654
type: 140.141.135.135:44617
type: 81.201.149.69:54097
type: 87.98.187.199:50751
type: 37.48.95.65:40819
type: 159.224.232.127:40092
type: 91.237.40.15:46769
type: 178.162.174.33:28006
type: 185.156.175.51:15904
type: 213.130.78.169:4224
type: 174.63.152.226:53374
type: 192.162.250.129:12308
type: 79.165.143.59:20976
type: 178.162.240.183:35908
type: 59.5.79.59:19775
type: 121.140.250.99:49966
type: 35.171.49.86:6992
type: 54.77.218.23:6992
type: 170.244.254.181:11454
type: 196.192.54.232:47837
type: 91.236.79.227:40634
type: 181.9.130.24:52959
type: 46.35.236.43:20974
type: 54.77.218.23:6892
type: 177.129.116.186:12345
type: 159.203.67.164:8000
type: 191.125.16.15:32257
type: 185.203.56.51:11464
type: 178.162.174.235:28015
type: 46.211.247.242:23413
type: 46.232.211.167:13409
type: 37.48.95.30:65088
type: 219.77.152.217:8012
type: 185.203.56.56:18070
type: 185.21.217.74:58533
type: 121.88.151.229:63073
type: 61.239.123.15:3315
type: 86.138.70.199:6889
type: 83.112.49.49:5095
type: 95.161.96.178:41950
type: 82.181.162.231:63923
type: 62.217.189.178:19457
type: 66.56.81.165:37545
type: 176.201.197.236:55123
type: 46.232.210.70:17309
type: 89.134.21.151:4003
type: 94.31.68.71:17325
type: 89.181.174.61:51496
type: 133.155.75.209:31595
type: 146.158.171.15:53113
type: 169.150.223.195:64098
type: 91.232.101.141:57701
type: 201.229.49.58:15649
Status:
terminated
Behavior Graph:
%3 guuid=a17988df-1800-0000-d3a0-461368080000 pid=2152 /usr/bin/sudo guuid=3e1dede1-1800-0000-d3a0-461371080000 pid=2161 /tmp/sample.bin guuid=a17988df-1800-0000-d3a0-461368080000 pid=2152->guuid=3e1dede1-1800-0000-d3a0-461371080000 pid=2161 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.spyw
Score:
72 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample scans a subnet
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1725780 Sample: mips.elf Startdate: 30/06/2025 Architecture: LINUX Score: 72 44 31.200.249.162, 31940, 54618 NETRACK-ASRU Russian Federation 2->44 46 178.162.174.153, 28005, 6881 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 2->46 48 101 other IPs or domains 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 Connects to many ports of the same IP (likely port scanning) 2->52 54 Sample scans a subnet 2->54 10 mips.elf configuration 2->10         started        12 dash rm 2->12         started        14 dash cut 2->14         started        16 8 other processes 2->16 signatures3 process4 process5 18 mips.elf sh 10->18         started        20 configuration 10->20         started        23 mips.elf sh 10->23         started        signatures6 25 sh crontab 18->25         started        29 sh 18->29         started        58 Opens /sys/class/net/* files useful for querying network interface information 20->58 60 Sample reads /proc/mounts (often used for finding a writable filesystem) 20->60 31 configuration 20->31         started        33 sh crontab 23->33         started        process7 file8 42 /var/spool/cron/crontabs/tmp.coyl6b, ASCII 25->42 dropped 62 Sample tries to persist itself using cron 25->62 64 Executes the "crontab" command typically for achieving persistence 25->64 35 sh crontab 29->35         started        38 configuration 31->38         started        signatures9 process10 signatures11 56 Executes the "crontab" command typically for achieving persistence 35->56 40 configuration 38->40         started        process12
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-06-30 17:18:08 UTC
File Type:
ELF32 Big (Exe)
AV detection:
13 of 36 (36.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery execution persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Reads CPU attributes
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Enumerates running processes
Reads MAC address of network interface
Reads hardware information
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 1821cb62914a9f3bc33840abf1f93c768701df52c400105ee01c258a06dfe7a5

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments