MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b085b1646b4bb588e1bd2106546e4ca030f97ff79a8f71ca086b1f6c26b666d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 5b085b1646b4bb588e1bd2106546e4ca030f97ff79a8f71ca086b1f6c26b666d
SHA3-384 hash: 10d468975408336208e8bf95e9547914c045a379d1bc85ad54dad909e30c0bc5bb06ed51b5de9651e6cd106128da5aa5
SHA1 hash: 823632be450dae8230e6f26c1192367c3b4b6d86
MD5 hash: 2f86e0c39646964eb5f6301c0a52b110
humanhash: avocado-harry-hot-seventeen
File name:aarch64
Download: download sample
File size:509'896 bytes
First seen:2025-06-14 14:50:50 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 6144:O/izeB+/ow3gK2lc5bvyI0vOHD6BZkDgn358cIF3RI5HkdY1FP98/8ecjfP:3BohHKTyfvOHD6ByD4WcIMkuDmEesP
TLSH T13BB41228EE4E3881F3D1E3B8DA0A4BB1B05B7DD0D166C1B2BA41E25D95EDDDEC5D0212
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creates directories
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
false
Architecture:
arm
Packer:
custom
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
41757
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.1:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 93.176.180.96:6881
type: 178.69.209.93:6881
type: 95.220.140.192:6881
type: 78.46.211.129:6881
type: 46.242.120.85:6881
type: 2.62.184.175:6881
type: 86.88.163.221:6881
type: 51.159.35.143:6881
type: 86.175.191.170:6881
type: 164.215.113.58:6881
type: 188.24.177.232:6881
type: 61.244.123.233:6881
type: 46.164.246.137:6881
type: 176.31.249.129:6881
type: 186.22.209.5:6881
type: 35.155.156.153:6881
type: 188.19.19.223:6881
type: 94.50.249.156:6881
type: 51.15.20.12:6881
type: 102.214.156.199:6881
type: 35.163.251.58:6881
type: 216.128.234.23:6881
type: 197.238.104.13:6881
type: 50.46.242.192:6881
type: 18.191.2.28:6881
type: 176.8.238.81:6881
type: 84.1.28.221:6881
type: 74.48.140.189:6881
type: 144.217.72.98:6881
type: 54.70.28.180:6881
type: 75.119.138.164:6881
type: 47.76.47.228:6881
type: 152.53.45.107:6881
type: 203.21.104.6:6881
type: 130.239.18.158:8580
type: 195.154.233.74:6880
type: 173.230.130.111:6880
type: 45.203.151.81:6880
type: 44.222.38.15:6880
type: 23.21.21.47:6880
type: 54.236.217.93:6880
type: 3.17.47.251:6880
type: 130.239.18.158:8516
type: 130.239.18.158:8513
type: 178.162.173.91:28003
type: 178.162.174.99:28003
type: 135.181.227.244:50000
type: 37.27.117.58:50000
type: 65.21.125.170:50000
type: 135.181.238.47:50000
type: 65.109.88.197:50000
type: 37.27.119.116:50000
type: 37.27.119.241:50000
type: 116.208.8.249:50000
type: 130.239.18.158:8508
type: 81.171.6.41:28004
type: 130.239.18.158:8539
type: 185.203.56.51:15182
type: 212.15.59.40:51413
type: 94.15.231.184:51413
type: 95.211.163.45:51413
type: 176.36.179.103:51413
type: 83.228.118.34:51413
type: 81.106.65.190:51413
type: 144.21.49.208:51413
type: 45.136.230.54:51413
type: 146.56.39.97:51413
type: 163.172.97.51:51413
type: 142.132.250.251:51413
type: 178.162.173.9:28012
type: 178.162.174.168:28012
type: 5.135.156.163:56843
type: 130.239.18.158:8524
type: 178.162.144.51:21183
type: 178.162.173.205:28015
type: 178.162.174.135:28009
type: 178.162.174.85:28009
type: 178.162.174.222:28014
type: 178.162.173.111:28005
type: 130.239.18.158:8531
type: 51.255.95.91:57259
type: 178.162.174.47:28007
type: 62.3.74.142:63029
type: 89.149.200.92:28025
type: 178.162.173.98:28000
type: 219.104.56.201:11161
type: 5.79.122.80:28013
type: 94.75.250.195:28006
type: 178.162.173.210:28006
type: 178.162.173.148:28006
type: 149.202.83.197:8080
type: 47.237.128.119:8080
type: 45.136.229.248:50838
type: 94.189.220.247:59862
type: 91.122.60.6:6889
type: 203.59.73.17:6889
type: 147.78.64.98:41449
type: 185.203.56.49:17129
type: 59.188.165.179:20268
type: 186.44.179.244:37742
type: 201.210.74.234:11779
type: 176.236.197.58:13244
type: 102.189.110.177:44726
type: 85.244.210.198:44726
type: 196.39.65.83:46928
type: 220.124.167.202:31178
type: 92.124.161.239:10018
type: 213.24.127.53:6919
type: 129.122.170.168:10449
type: 178.69.15.78:17830
type: 188.165.246.171:53213
type: 70.80.145.185:39019
type: 147.12.204.21:62268
type: 62.210.253.159:31892
type: 37.187.127.104:37196
type: 46.241.106.87:54222
type: 178.162.173.160:28002
type: 212.227.139.122:58118
type: 125.178.167.8:62538
type: 157.147.65.236:14881
type: 138.19.90.19:17187
type: 185.149.91.42:51598
type: 172.111.150.108:45327
type: 213.91.248.83:7779
type: 213.152.187.243:15814
type: 94.41.249.51:62140
type: 78.84.239.108:32101
type: 180.176.95.92:30116
type: 212.7.204.77:21008
type: 217.178.29.54:6493
type: 194.28.103.4:6886
type: 152.53.252.200:26881
type: 65.108.143.34:33879
type: 216.15.52.67:22301
type: 189.51.23.118:7024
type: 146.212.92.228:13184
type: 80.252.51.37:39166
type: 91.231.41.114:39551
type: 89.223.204.220:14181
type: 50.39.148.163:8999
type: 80.80.154.16:8999
type: 78.37.41.225:4710
type: 94.25.68.18:11264
type: 109.127.175.72:20778
type: 112.168.52.23:15685
type: 124.120.52.23:33199
type: 196.81.93.85:21381
type: 178.237.225.73:11347
type: 78.24.103.194:43675
type: 77.40.61.214:14259
type: 14.7.231.107:41160
type: 195.170.172.38:10240
type: 146.59.3.81:10240
type: 152.53.52.107:10240
type: 89.134.28.76:61821
type: 46.110.84.111:55063
type: 220.81.161.188:37632
type: 62.175.117.133:35169
type: 88.233.179.82:45554
type: 5.39.85.217:52274
type: 142.114.70.30:30628
type: 188.165.201.80:51055
type: 37.238.104.13:60194
type: 43.240.149.123:32681
type: 95.214.53.172:1688
type: 88.241.93.85:59692
type: 202.78.232.134:26708
type: 190.14.232.134:52197
type: 137.74.200.136:53751
type: 84.54.78.67:8025
type: 54.77.218.23:6892
type: 152.53.45.107:6990
type: 54.39.52.64:48853
type: 5.135.138.216:42538
type: 152.53.45.107:7348
type: 95.24.119.42:14923
type: 79.37.186.75:28763
type: 169.197.143.248:62244
type: 186.11.117.26:5720
type: 220.125.194.132:40959
type: 78.83.119.231:56990
type: 92.62.58.2:40362
Status:
terminated
Behavior Graph:
%3 guuid=607d4e97-1600-0000-53d3-a607680c0000 pid=3176 /usr/bin/sudo guuid=c26d1a99-1600-0000-53d3-a6076a0c0000 pid=3178 /tmp/sample.bin guuid=607d4e97-1600-0000-53d3-a607680c0000 pid=3176->guuid=c26d1a99-1600-0000-53d3-a6076a0c0000 pid=3178 execve guuid=8a5cce99-1600-0000-53d3-a6076d0c0000 pid=3181 /usr/bin/dash guuid=c26d1a99-1600-0000-53d3-a6076a0c0000 pid=3178->guuid=8a5cce99-1600-0000-53d3-a6076d0c0000 pid=3181 clone guuid=98c0e199-1600-0000-53d3-a6076e0c0000 pid=3182 /usr/bin/dash guuid=c26d1a99-1600-0000-53d3-a6076a0c0000 pid=3178->guuid=98c0e199-1600-0000-53d3-a6076e0c0000 pid=3182 clone guuid=5204fd99-1600-0000-53d3-a6076f0c0000 pid=3183 /usr/bin/dash guuid=c26d1a99-1600-0000-53d3-a6076a0c0000 pid=3178->guuid=5204fd99-1600-0000-53d3-a6076f0c0000 pid=3183 clone guuid=27a60b9a-1600-0000-53d3-a607700c0000 pid=3184 /usr/bin/dash guuid=c26d1a99-1600-0000-53d3-a6076a0c0000 pid=3178->guuid=27a60b9a-1600-0000-53d3-a607700c0000 pid=3184 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw
Score:
68 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1714737 Sample: aarch64.elf Startdate: 14/06/2025 Architecture: LINUX Score: 68 38 62.3.74.142, 63029, 6881 ZEN-ASZenInternet-UKGB United Kingdom 2->38 40 103.137.228.243, 31247 WMTIPL-AS-INWinmaxTelecommunicationIndiaPrivateLimited Japan 2->40 42 101 other IPs or domains 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Connects to many ports of the same IP (likely port scanning) 2->46 10 aarch64.elf 2->10         started        signatures3 process4 process5 12 aarch64.elf sh 10->12         started        14 aarch64.elf 10->14         started        17 aarch64.elf sh 10->17         started        signatures6 19 sh crontab 12->19         started        23 sh 12->23         started        54 Opens /sys/class/net/* files useful for querying network interface information 14->54 56 Sample reads /proc/mounts (often used for finding a writable filesystem) 14->56 25 aarch64.elf 14->25         started        27 sh crontab 17->27         started        process7 file8 36 /var/spool/cron/crontabs/tmp.BPqWdP, ASCII 19->36 dropped 48 Sample tries to persist itself using cron 19->48 50 Executes the "crontab" command typically for achieving persistence 19->50 29 sh crontab 23->29         started        32 aarch64.elf 25->32         started        signatures9 process10 signatures11 52 Executes the "crontab" command typically for achieving persistence 29->52 34 aarch64.elf 32->34         started        process12
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-06-14 12:14:14 UTC
File Type:
ELF64 Little (Exe)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 5b085b1646b4bb588e1bd2106546e4ca030f97ff79a8f71ca086b1f6c26b666d

(this sample)

  
Delivery method
Distributed via web download

Comments