MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f7ac113c8dfd501b641e515d8cb23053fc699507f9360c7964e9b5960f60fcd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 5 File information Comments

SHA256 hash: 3f7ac113c8dfd501b641e515d8cb23053fc699507f9360c7964e9b5960f60fcd
SHA3-384 hash: 975917f072da2044920ea704822dbd6cd69fc1096ec54e5cef2ae94b03866cb14ed1bb498d581b898d577895c479adae
SHA1 hash: bb4d00eb99bdbedf42b016b07edef818f22d8f01
MD5 hash: c7cf0eb45c6c2e0f7da02dd3c28666df
humanhash: glucose-delta-lithium-foxtrot
File name:usbhubset
Download: download sample
File size:441'936 bytes
First seen:2026-02-21 19:50:05 UTC
Last seen:2026-02-21 20:37:42 UTC
File type: elf
MIME type:application/x-sharedlib
ssdeep 12288:k9JsWwR94p/PyyBEK9JsWwR94p/PyyBE:k99W+NyWEK99W+NyWE
TLSH T15294180BB2B1597DD09BF0348ACBD6B26870B4F42331752F37829D732D67E950B686A1
telfhash t10c11ba1f993d47d895a64d35dc2807e38087d26aa022e714ff55eec0545f446f128d4f
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter smica83
Tags:AutoColor elf

Intelligence


File Origin
# of uploads :
2
# of downloads :
97
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
AutoColor
Details
AutoColor
c2 configuration and missionids
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
gcc
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
19
Number of processes launched:
4
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=84e5a70a-1800-0000-1509-b4fd210d0000 pid=3361 /usr/bin/sudo guuid=6676580d-1800-0000-1509-b4fd290d0000 pid=3369 /tmp/sample.bin delete-file write-config write-file guuid=84e5a70a-1800-0000-1509-b4fd210d0000 pid=3361->guuid=6676580d-1800-0000-1509-b4fd290d0000 pid=3369 execve guuid=cb79b10e-1800-0000-1509-b4fd2a0d0000 pid=3370 /tmp/sample.bin zombie guuid=6676580d-1800-0000-1509-b4fd290d0000 pid=3369->guuid=cb79b10e-1800-0000-1509-b4fd2a0d0000 pid=3370 clone guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3371 /tmp/sample.bin dns net send-data write-file zombie guuid=cb79b10e-1800-0000-1509-b4fd2a0d0000 pid=3370->guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3371 clone 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3371->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 1505B 6e3840e4-cacf-55ef-aefb-826f5f83719e tracksyscloud.com:443 guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3371->6e3840e4-cacf-55ef-aefb-826f5f83719e con 320de0fb-8fa0-5a05-8d1c-403626ec9fcc tracksyscloud.com:8080 guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3371->320de0fb-8fa0-5a05-8d1c-403626ec9fcc con 515aea1c-949f-53b8-825c-1ff13a1fc035 tracksyscloud.com:80 guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3371->515aea1c-949f-53b8-825c-1ff13a1fc035 con guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3373 /tmp/sample.bin guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3371->guuid=fbc0ba0e-1800-0000-1509-b4fd2b0d0000 pid=3373 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Creates /etc/ld.so.preload
Deletes /etc/ld.so.preload (likely AV evasion)
Multi AV Scanner detection for submitted file
Sample deletes itself
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1872899 Sample: usbhubset.elf Startdate: 21/02/2026 Architecture: LINUX Score: 60 26 169.254.169.254, 80 USDOSUS Reserved 2->26 28 109.202.202.202, 80 INIT7CH Switzerland 2->28 30 4 other IPs or domains 2->30 32 Multi AV Scanner detection for submitted file 2->32 8 usbhubset.elf 2->8         started        12 dash rm 2->12         started        14 dash rm 2->14         started        16 python3.8 dpkg 2->16         started        signatures3 process4 file5 22 /var/log/usb/usbhubset, ELF 8->22 dropped 24 /etc/ld.so.preload, ASCII 8->24 dropped 34 Creates /etc/ld.so.preload 8->34 36 Deletes /etc/ld.so.preload (likely AV evasion) 8->36 38 Sample deletes itself 8->38 18 usbhubset.elf 8->18         started        signatures6 process7 process8 20 usbhubset.elf 18->20         started       
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2026-02-20 12:40:14 UTC
File Type:
ELF64 Little (SO)
AV detection:
11 of 23 (47.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion exection linux persistence privilege_escalation
Behaviour
Writes file to tmp directory
Deletes log files
Deletes itself
Modifies the dynamic linker configuration file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments