MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 503af7e2b3fdf47fa0333c73f5e83d3a666a6c0a9b2f13c64fb1d6999e0a0c3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: 503af7e2b3fdf47fa0333c73f5e83d3a666a6c0a9b2f13c64fb1d6999e0a0c3f
SHA3-384 hash: cf2834898b4e7c94a170e21aa19e36a8ad0272945de750ba9bece5c46b008251bf575ba21141ed9bf98e237223960a7a
SHA1 hash: 5373f8f80d2f96e39cdf9a1c5ed2625e69b6e083
MD5 hash: 468ab5d2bf7514f818ba982137e33e56
humanhash: robert-single-asparagus-black
File name:dlr.x86_64
Download: download sample
File size:291'608 bytes
First seen:2026-02-13 10:19:52 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 6144:NemqhWfdVzKvinM5qsBoeEvU1PedLmMBcXm83dD+NVUfedOK:NeeFVn6ZsU1Pe2Xm2tYCeV
TLSH T16C5423FFC22671FBE832537EF54C57D7D662A0B689AC82436EEC22468C175891B2E414
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf UPX
File size (compressed) :291'608 bytes
File size (de-compressed) :797'984 bytes
Format:linux/amd64
Unpacked file: 9d70d33f599b92639c7d852f87610e9863aa1e275967a6d054895b81a942fb8b

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
UPX
Botnet:
unknown
Number of open files:
0
Number of processes launched:
2
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
type:Mirai 85.120.81.158:18916
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=b7ff977f-1a00-0000-0276-9646680a0000 pid=2664 /usr/bin/sudo guuid=19abde81-1a00-0000-0276-96466f0a0000 pid=2671 /tmp/sample.bin mprotect-exec guuid=b7ff977f-1a00-0000-0276-9646680a0000 pid=2664->guuid=19abde81-1a00-0000-0276-96466f0a0000 pid=2671 execve guuid=5c6b0783-1a00-0000-0276-9646720a0000 pid=2674 /tmp/sample.bin net send-data zombie guuid=19abde81-1a00-0000-0276-96466f0a0000 pid=2671->guuid=5c6b0783-1a00-0000-0276-9646720a0000 pid=2674 clone 9a879bbc-4172-50bb-9ccc-3f2fec1498e9 77.88.8.8:53 guuid=5c6b0783-1a00-0000-0276-9646720a0000 pid=2674->9a879bbc-4172-50bb-9ccc-3f2fec1498e9 con bb069c8b-4c58-560a-bbbf-f43a155962e9 85.120.81.158:18916 guuid=5c6b0783-1a00-0000-0276-9646720a0000 pid=2674->bb069c8b-4c58-560a-bbbf-f43a155962e9 send: 7B
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Malicious sample detected (through community Yara rule)
Sample is packed with UPX
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery linux upx
Behaviour
Reads runtime system information
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 503af7e2b3fdf47fa0333c73f5e83d3a666a6c0a9b2f13c64fb1d6999e0a0c3f

(this sample)

Comments