MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1a6136232945f81d14d34e2da95eee0b3d6333fb5d11192a496c38d7b54ce5b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 1a6136232945f81d14d34e2da95eee0b3d6333fb5d11192a496c38d7b54ce5b2 |
|---|---|
| SHA3-384 hash: | 19302ff0553b4dfeb6e0fbadc20446a577765a5e751345e75a2d5f424b9ce597d122447a7a04eff7cd5731943692bc0e |
| SHA1 hash: | 6b47238c06e8093dd691f37609615b0962385671 |
| MD5 hash: | fafd546e9e5f6e69b1fe094068230d78 |
| humanhash: | uniform-queen-utah-indigo |
| File name: | bot |
| Download: | download sample |
| File size: | 13'632 bytes |
| First seen: | 2024-12-14 14:55:58 UTC |
| Last seen: | 2024-12-14 17:01:02 UTC |
| File type: | elf |
| MIME type: | application/x-executable |
| ssdeep | 96:GQGTLfFRmYbS41Gl7z9Z/9qiHJ9z0/lhYOJ3YwHeL7Rtr/R4q7gRc1KnSvcO5wew:GQGvFIDl7zJ7z0/lhV1dHeLVRRxenS |
| TLSH | T173529663BB91893EC0E493344D97823471BBE4F19736132B350827F51E9278D1E2E6D6 |
| telfhash | t1c1b0120155a94c6d5fe32034932109de72434163099042644124d290903b4401868b9f |
| TrID | 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12) 49.8% (.O) ELF Executable and Linkable format (generic) (4000/1) |
| Magika | elf |
| Reporter | |
| Tags: | bot elf |
Intelligence
File Origin
# of uploads :
2
# of downloads :
82
Origin country :
DEVendor Threat Intelligence
Verdict:
Clean
Score:
99.9%
Link:
Tags:
malware
Result
Verdict:
Clean
Maliciousness:
Behaviour
Runs as daemon
Connection attempt
Receives data from a server
Verdict:
Unknown
Threat level:
2.5/10
Confidence:
100%
Tags:
gcc
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
87.121.86.161
Number of open files:
7
Number of processes launched:
2
Processes remaning?
true
Remote TCP ports scanned:
not identified
Full report:
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Verdict:
Unknown
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
22 / 100
Signature
Contains symbols with names commonly found in malware
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
ELF
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2024-12-14 14:56:04 UTC
File Type:
ELF64 Little (Exe)
AV detection:
5 of 24 (20.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
Unknown
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
elf 1a6136232945f81d14d34e2da95eee0b3d6333fb5d11192a496c38d7b54ce5b2
(this sample)
Delivery method
Distributed via web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.Connects to 87.121.86.161:6677 TCP