MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Hive


Vendor detections: 9


Intelligence 9 IOCs YARA 11 File information Comments

SHA256 hash: 713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771
SHA3-384 hash: dd430d9e5eae9933d67140c0accc66da8223f751de78d68acfb5495f8c5e87347c8984663532f716ea22badc1dc92746
SHA1 hash: 322db4ca435004a127acd4171cc52be9edaf5338
MD5 hash: 171d2a50c6d7e69281d1c3ef98d510f2
humanhash: happy-carpet-lithium-quiet
File name:713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771
Download: download sample
Signature Hive
File size:2'367'488 bytes
First seen:2023-07-25 23:41:28 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 49152:bC9tUNrb/T7vO90dL3BmAFd4A64nsfJcm9M3YJIpgfDVw0ksgg778GzvyKYUcTD1:bzcM4IyEWyKP
TLSH T18DB54C43B8A065EEC4AB93304D5192D6BA70384D173863F71BA197B91F72BD4AFB6700
telfhash t12b327b3549bd34b5b6a6da11b393b1b8963318a567f834f16023a9c4ffc5f801ca6837
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter signalblur
Tags:elf Hive linux malware Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
810
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
2
Number of processes launched:
4
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
rans.spre.troj.evad
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
Creates a notice file (html or txt) to demand a ransom
Found Tor onion address
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Reads system files that contain records of logged in users
Sample deletes itself
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Sample tries to kill multiple processes (SIGKILL)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1279716 Sample: 6jGqxxCUvf.elf Startdate: 26/07/2023 Architecture: LINUX Score: 92 93 109.202.202.202, 80 INIT7CH Switzerland 2->93 95 185.125.188.137, 443, 56400 CANONICAL-ASGB United Kingdom 2->95 97 3 other IPs or domains 2->97 99 Malicious sample detected (through community Yara rule) 2->99 101 Antivirus / Scanner detection for submitted sample 2->101 103 Multi AV Scanner detection for submitted file 2->103 105 2 other signatures 2->105 11 systemd gdm3 2->11         started        13 dash rm 6jGqxxCUvf.elf 2->13         started        17 systemd gpu-manager 2->17         started        19 27 other processes 2->19 signatures3 process4 file5 21 gdm3 gdm-session-worker 11->21         started        33 3 other processes 11->33 85 /MEag_HOW_TO_DECRYPT.txt, ASCII 13->85 dropped 87 /home/saturnino/.c..._bd-JZhnbYLg0.ndjmu, COM 13->87 dropped 89 /home/saturnino/.a..._WVTUW_2RFcs0.ndjmu, DOS 13->89 dropped 111 Sample tries to kill multiple processes (SIGKILL) 13->111 113 Sample deletes itself 13->113 115 Sample tries to access files in /etc/config/ (typical for OpenWRT routers) 13->115 23 gpu-manager sh 17->23         started        25 gpu-manager sh 17->25         started        35 6 other processes 17->35 91 /var/log/wtmp, data 19->91 dropped 117 Sample reads /proc/mounts (often used for finding a writable filesystem) 19->117 119 Reads system files that contain records of logged in users 19->119 27 logrotate sh 19->27         started        29 accounts-daemon language-validate 19->29         started        31 logrotate sh 19->31         started        37 3 other processes 19->37 signatures6 process7 process8 39 gdm-session-worker gdm-wayland-session 21->39         started        41 sh grep 23->41         started        43 sh grep 25->43         started        45 sh invoke-rc.d 27->45         started        47 language-validate language-options 29->47         started        49 sh rsyslog-rotate 31->49         started        51 sh grep 35->51         started        53 sh grep 35->53         started        55 4 other processes 35->55 process9 57 gdm-wayland-session dbus-run-session 39->57         started        59 gdm-wayland-session dbus-daemon 39->59         started        62 invoke-rc.d runlevel 45->62         started        64 invoke-rc.d systemctl 45->64         started        66 invoke-rc.d ls 45->66         started        68 invoke-rc.d systemctl 45->68         started        70 language-options sh 47->70         started        72 rsyslog-rotate systemctl 49->72         started        signatures10 74 dbus-run-session dbus-daemon 57->74         started        109 Sample reads /proc/mounts (often used for finding a writable filesystem) 59->109 77 dbus-daemon 59->77         started        79 sh locale 70->79         started        81 sh grep 70->81         started        process11 signatures12 107 Sample reads /proc/mounts (often used for finding a writable filesystem) 74->107 83 dbus-daemon false 77->83         started        process13
Threat name:
Linux.Ransomware.FileCoder
Status:
Malicious
First seen:
2021-12-01 15:58:00 UTC
File Type:
ELF64 Little (Exe)
AV detection:
25 of 38 (65.79%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:hive linux ransomware
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Enumerates running processes
Reads CPU attributes
Reads hardware information
Reads network interface configuration
Deletes itself
Hive
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:GoBinTest
Rule name:golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_duffcopy_amd64
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:Linux_Ransomware_Hive_bdc7de59
Author:Elastic Security
Rule name:RAN_ELF_Hive_Dec_2021_1
Author:Arkbird_SOLG
Description:Detect ELF version of Hive ransomware (x64 version)
Reference:https://twitter.com/ESETresearch/status/1454100591261667329
Rule name:RAN_ELF_Hive_Oct_2021_1
Author:Arkbird_SOLG
Description:Detect ELF version of Hive ransomware
Reference:https://twitter.com/ESETresearch/status/1454100591261667329
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
Rule name:win_hive_w0
Author:rivitna
Description:Hive v3 ransomware Windows/Linux/FreeBSD payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments