MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 59c29436755b0778e968d49feeae20ed65f5fa5e35f9f7965b8ed93420db91e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CoinMiner
Vendor detections: 8
| SHA256 hash: | 59c29436755b0778e968d49feeae20ed65f5fa5e35f9f7965b8ed93420db91e5 |
|---|---|
| SHA3-384 hash: | 29617d25bcb2550593d80c6a3c2813673b8e798737a0ebdda830c929addd6b145972f7292f202627ec0e9c179f67d7a3 |
| SHA1 hash: | f5fc002cc1f87c9c907be7e04170e89de4f0bda8 |
| MD5 hash: | aaa5098c9caafccf15362b017825c64b |
| humanhash: | item-five-network-quiet |
| File name: | x86_64 |
| Download: | download sample |
| Signature | CoinMiner |
| File size: | 1'880'264 bytes |
| First seen: | 2025-11-14 19:59:26 UTC |
| Last seen: | 2026-02-12 11:07:46 UTC |
| File type: | elf |
| MIME type: | application/x-executable |
| ssdeep | 49152:EpCKabVQ+9qlNlpjN8H8JZGtucdfFY91ujYIQ+:fBqnN8H8HIazujYIQ+ |
| TLSH | T18B9533D309864BF0BFA2EF3451585D86EA60EE744B7CB2B8F3B0A27436436E5E160475 |
| TrID | 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12) 49.8% (.O) ELF Executable and Linkable format (generic) (4000/1) |
| Magika | elf |
| Reporter | |
| Tags: | CoinMiner elf UPX |
UPX packed
This file is packed with UPX. We have therefore unpacked the file. Below is furhter information about the unpacked (de-compressed) file.
| File size (compressed) : | 1'880'264 bytes |
|---|---|
| File size (de-compressed) : | 5'040'232 bytes |
| Format: | linux/amd64 |
| Unpacked file: | 7f1b7e921dde341bcfea9f0ed334e2b0ac652aa8acffd22aab5d9536375c78c5 |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Behaviour
Botnet C2s
Result
Signature
Behaviour
Result
Behaviour
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | SUSP_ELF_LNX_UPX_Compressed_File |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious ELF binary with UPX compression |
| Reference: | Internal Research |
| Rule name: | upx_packed_elf_v1 |
|---|---|
| Author: | RandomMalware |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.[redtail.x86_64 (ELF, 1.8MB, UPX packed)] Captured by Cowrie SSH
honeypot (Tencent Cloud, China) on 2026-02-18.
Attack chain:
1. Brute-force IP: 134.209.194.195
(AS14061 DigitalOcean LLC, Amsterdam, NL)
- Credentials tried: root:root, root:root123, root:root321,
root:123, root:321, root:pass, root:qwerty,
root:password, root:111111 (all succeeded in honeypot)
- Post-login recon collected: uname, arch, uptime, CPU model,
GPU info (lspci nvidia), last logins
2. Deployer IP: 130.12.180.51
(AS202412 Omegatech LTD, Aachen, DE)
Note: previously reported as AS214943 Railnet LLC —
ASN appears to have changed.
- Login: root:P
- Uploaded via SFTP (6 files):
clean.sh d46555af... (kills c3pool_miner, clears crontabs)
setup.sh 783adb7a... (arch detection + dropper)
redtail.x86_64 59c29436...
redtail.arm8 dbb7ebb9...
redtail.arm7 3625d068...
redtail.i686 048e374b...
- Persistence: RSA pubkey injected to ~/.ssh/authorized_keys
with chattr +ai (immutable flag)
- Backdoor key: rsa-key-20230629
AAAAB3NzaC1yc2EAAAADAQABAAABAQCqHrvnL6l7rT/mt1AdgdY9tC1G
PK216q0q/7neNVqm7AgvfJIM3ZKniGC3S5x6KOEApk+83GM4IKjCPfq0
07SvT07qh9AscVxegv66I5yuZTEaDAG6cPXxg3/0oXHTOTvxelgbRrMz
fU5SEDAEi8+ByKMefE+pDVALgSTBYhol96hu1GthAMtPAFahqxrvaRR4
nL4ijxOsmSLREoAb1lxiX7yvoYLT45/1c5dJdrJrQ60uKyieQ6FieWpO
2xF6tzfdmHbiVdSmdw0BiCRwe+fuknZYQxIC1owAj2p5bc+nzVTi3mtB
Ek9rGpgBnJ1hcEUslEf/zevIcX8+6H7kUMRr
- Success signal: echo auth_ok (hex-encoded in command)
2 deployment sessions observed:
2026-02-18T12:13:51Z session fdc846e28eb7
2026-02-18T13:24:58Z session c765468ffd86
Corroborates campaign reported by David Tom Foss (2026-02-12,
Finland). Same deployer IP, same TTPs, same backdoor pubkey.
Distribution server: 178.16.55.224 (Metaspinner.net, DE) —
now offline per URLhaus #3614077.
[redtail.x86_64 (ELF, 1.8 MB)] Captured by maritime SCADA/ICS Cowrie SSH honeypot (Hetzner Helsinki, Finland) between 2026-02-07 and 2026-02-09. Deployer IP: 130.12.180.51 (AS214943 Railnet LLC, London/Amsterdam). Attack chain: SSH brute-force (root:P) -> clean.sh removes competing miners (c3pool_miner) -> setup.sh detects arch and deploys -> redtail.{arch} runs in SSH worm mode. Persistence: SSH RSA key injection into authorized_keys with chattr +ai (immutable). 9 deployment sessions, 54 total file transfers. Platform acknowledged by BSI CERT-Bund as research infrastructure. -- David Tom Foss, FOSS Intelligence Holdings Ltd. (ORCID: 0009-0004-0289-7154)