MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 755ff9eae2016c5eece463988018d72ec4de709b81382e98dca0120fc4e8800a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA 3 File information Comments

SHA256 hash: 755ff9eae2016c5eece463988018d72ec4de709b81382e98dca0120fc4e8800a
SHA3-384 hash: 25fa24b0d230530b715b5eeb4d02ba7eaa2a892a5034406d00e3081f6afc2db43792a2d628f75c8c7ab894983db6a98e
SHA1 hash: 7dd3a1a8756bc500ec79024262b6af622ee5ef4e
MD5 hash: 61b842aa8a18fd1e5cac8f9060d1a025
humanhash: uranus-montana-zebra-sink
File name:bot_mips
Download: download sample
File size:72'556 bytes
First seen:2026-05-16 16:26:22 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:8oXjf3ufVML24FgU1g7fUGq5Gc2o755eib9:8KycSUCboT2o1B
TLSH T11A63E88B73918EDCF991D3750A67C3F423C450629DC15A6BE03CF2922AC93589E7DB1A
telfhash t132d0221aa2b60c0cc1fa16329c488b12a0133b2242248e208e18e7c0d03f818f35dc8a
Magika elf
Reporter BlinkzSec

Intelligence


File Origin
# of uploads :
1
# of downloads :
18
Origin country :
ES ES
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
mips
Packer:
not packed
Botnet:
unknown
Number of open files:
9
Number of processes launched:
1
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=d2c06412-1b00-0000-e72f-631f740c0000 pid=3188 /usr/bin/sudo guuid=cf944c15-1b00-0000-e72f-631f780c0000 pid=3192 /tmp/sample.bin guuid=d2c06412-1b00-0000-e72f-631f740c0000 pid=3188->guuid=cf944c15-1b00-0000-e72f-631f780c0000 pid=3192 execve
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Network Configuration Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 755ff9eae2016c5eece463988018d72ec4de709b81382e98dca0120fc4e8800a

(this sample)

  
Delivery method
Distributed via web download

Comments