MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 352643663101a2bb063187476f7133e1fb35d91c28c249560253cdc24cc8f775. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 352643663101a2bb063187476f7133e1fb35d91c28c249560253cdc24cc8f775
SHA3-384 hash: b9b8f49bca1fa70f5169af9a5060e3293f6abda7e588b9f18e4c5c7163ee98c33ef2be5c371001d5ac4fbf221cc86a69
SHA1 hash: 513f410666ab56bec3f444f36d59dad7fba420e5
MD5 hash: 7f5796bc56eaa6d2894d6bef49af4aba
humanhash: carbon-eight-zebra-hamper
File name:dlr.arm4
Download: download sample
File size:1'164 bytes
First seen:2026-02-01 07:35:43 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 24:FnJ/0vRVCO8DTuJ2BCDclaGjFcsLFdIdmF5vj2IOkVNfDm:ZJcCO8DakCAoGjFLLZ2IOkVNbm
TLSH T1D5219EA677E2AD57CC640777DD9B5B10A322EBC8C28FB113F74252170D2F21A5B12545
telfhash t1c1900264428f44e89b850241a04a65018ec4f3231225285016c0484055033106045141
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
masquerade
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2026-01-22T19:49:00Z UTC
Last seen:
2026-02-01T06:56:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=f4f01053-1900-0000-a9db-dad4e7090000 pid=2535 /usr/bin/sudo guuid=a08e8455-1900-0000-a9db-dad4ee090000 pid=2542 /tmp/sample.bin guuid=f4f01053-1900-0000-a9db-dad4e7090000 pid=2535->guuid=a08e8455-1900-0000-a9db-dad4ee090000 pid=2542 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1861161 Sample: dlr.arm4.elf Startdate: 01/02/2026 Architecture: LINUX Score: 48 14 169.254.169.254, 80 USDOSUS Reserved 2->14 16 162.213.35.25, 443, 56100 CANONICAL-ASGB United States 2->16 18 3 other IPs or domains 2->18 20 Multi AV Scanner detection for submitted file 2->20 6 python3.8 dpkg 2->6         started        8 dash rm 2->8         started        10 dash rm 2->10         started        12 dlr.arm4.elf 2->12         started        signatures3 process4
Threat name:
Linux.Downloader.Mirai
Status:
Malicious
First seen:
2026-02-01 07:36:21 UTC
File Type:
ELF32 Little (Exe)
AV detection:
15 of 36 (41.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 352643663101a2bb063187476f7133e1fb35d91c28c249560253cdc24cc8f775

(this sample)

  
Delivery method
Distributed via web download

Comments