MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8e7c44b6cdbf75b384417c902ce5c6dff8f97b3e60acaff6b47adcf5586d5800. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 8e7c44b6cdbf75b384417c902ce5c6dff8f97b3e60acaff6b47adcf5586d5800
SHA3-384 hash: 764bf3d4538142fca4863ce87da387e76e1be39f0d9a90c6c2fdcee02c224e7ec40b43b6a0421aceaadc4a25931838b5
SHA1 hash: bfa45d840258140c283a1084177c9097d46a259e
MD5 hash: ed63be6710e4d4a0630280fbfbc0b585
humanhash: purple-wolfram-speaker-mike
File name:aarch64
Download: download sample
File size:509'896 bytes
First seen:2025-06-05 05:35:05 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 6144:O/izeB+/ow3gK2lc5bvyI0vOHD6BZkDgn358cIF3RI5HkdY1FP98/8ecjfP:3BohHKTyfvOHD6ByD4WcIMkuDmEesP
TLSH T165B41228EE4E38D1F3D1E378DA0A4BB2B05B79D0C166C1B2BA41E25D95EDDDEC5D0212
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creates directories
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
exploit gcc lolbin remote
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
false
Architecture:
arm
Packer:
custom
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.123:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 178.69.209.93:6881
type: 45.154.86.83:6881
type: 95.66.217.20:6881
type: 63.247.211.162:6881
type: 176.193.231.215:6881
type: 138.201.118.174:6881
type: 91.121.86.177:6881
type: 37.112.3.233:6881
type: 78.62.142.182:6881
type: 91.121.148.35:6881
type: 86.179.75.131:6881
type: 188.155.201.235:6881
type: 78.10.164.69:6881
type: 114.36.20.167:6881
type: 212.220.56.67:6881
type: 185.64.208.233:6881
type: 176.211.216.185:6881
type: 18.221.7.72:6881
type: 93.188.86.152:6881
type: 188.25.82.142:6881
type: 35.167.186.212:6881
type: 73.39.125.236:6881
type: 211.2.8.83:6881
type: 93.124.28.247:6881
type: 119.28.68.97:6881
type: 195.35.14.152:6881
type: 18.190.61.127:6881
type: 85.175.5.106:6881
type: 49.43.161.220:6881
type: 86.133.81.1:6881
type: 192.227.221.84:6881
type: 35.163.251.58:6881
type: 18.191.2.28:6881
type: 102.213.209.1:6881
type: 75.119.138.164:6881
type: 95.152.4.248:6881
type: 61.3.186.40:6881
type: 185.183.32.101:6881
type: 83.68.38.25:6881
type: 114.35.9.164:6881
type: 130.239.18.158:8515
type: 178.162.174.222:28014
type: 178.162.174.43:28004
type: 178.162.174.227:28004
type: 130.239.18.158:8524
type: 185.157.244.164:58304
type: 148.153.170.2:6880
type: 69.164.203.179:6880
type: 45.203.154.72:6880
type: 45.203.208.35:6880
type: 185.107.71.103:44737
type: 130.239.18.158:8513
type: 212.39.71.64:44748
type: 178.162.173.156:28008
type: 83.149.84.32:28008
type: 138.199.27.226:51413
type: 95.131.148.78:51413
type: 223.19.7.4:51413
type: 152.165.223.77:51413
type: 195.96.234.88:51413
type: 81.0.219.151:51413
type: 116.251.193.27:51413
type: 36.24.232.6:51413
type: 123.118.101.209:51413
type: 188.166.98.93:51413
type: 84.126.1.159:51413
type: 130.239.18.158:8580
type: 45.13.6.185:28260
type: 201.41.176.238:23035
type: 176.110.231.233:39806
type: 176.110.196.116:13012
type: 88.170.21.79:50549
type: 81.66.177.19:6889
type: 87.21.217.134:6889
type: 95.19.91.93:64824
type: 81.171.20.66:64010
type: 37.48.89.181:48531
type: 24.107.75.134:15298
type: 213.227.151.25:28006
type: 45.87.251.157:63305
type: 178.162.173.212:28010
type: 49.49.250.28:51166
type: 89.134.5.167:6009
type: 45.136.229.10:51468
type: 89.149.207.208:21196
type: 178.162.173.166:28000
type: 51.38.81.122:8641
type: 92.126.15.203:49001
type: 37.27.119.121:50000
type: 148.251.120.40:50000
type: 45.90.46.128:39335
type: 193.23.250.46:50171
type: 1.65.193.224:17564
type: 92.115.33.143:32000
type: 89.212.109.39:58888
type: 45.137.212.10:8823
type: 162.237.148.43:62770
type: 112.168.183.106:20914
type: 134.101.14.208:59233
type: 178.140.108.172:47240
type: 145.40.184.16:60368
type: 186.224.139.48:18646
type: 178.43.54.190:6882
type: 216.82.22.182:5019
type: 60.76.115.234:61915
type: 45.87.251.11:28092
type: 95.168.162.206:13828
type: 46.242.8.54:3503
type: 46.147.143.115:16575
type: 2.80.64.130:61413
type: 62.93.165.64:37259
type: 23.16.185.23:37693
type: 31.131.200.19:20482
type: 185.149.91.73:20017
type: 51.75.64.23:8660
type: 109.160.49.83:31811
type: 178.214.247.48:20065
type: 178.136.106.13:37422
type: 45.87.251.149:28058
type: 119.202.64.29:40864
type: 89.45.4.9:50055
type: 93.241.231.236:56197
type: 178.237.238.233:20139
type: 89.149.222.146:57372
type: 175.204.217.140:33037
type: 178.66.131.159:3173
type: 97.113.94.222:46783
type: 51.182.12.207:60677
type: 185.21.216.189:63498
type: 24.245.130.13:47164
type: 5.18.168.211:6291
type: 51.159.104.82:8874
type: 121.141.1.170:40097
type: 81.171.17.184:30151
type: 99.199.162.2:10222
type: 81.171.17.184:30137
type: 195.154.185.217:25577
type: 121.133.39.127:40995
type: 188.165.201.80:53937
type: 61.84.34.217:7808
type: 187.120.26.3:40154
type: 185.203.56.40:62176
type: 211.184.115.147:32862
type: 59.16.236.161:7438
type: 161.142.150.187:18644
type: 79.139.217.163:1396
type: 211.252.174.231:33339
type: 125.131.124.13:53490
type: 179.125.142.155:8075
type: 83.31.192.17:40906
type: 118.137.31.170:37421
type: 121.163.56.203:8067
type: 93.119.163.154:49994
type: 95.105.67.189:41162
type: 187.67.57.118:29450
type: 212.39.71.46:6828
type: 24.16.220.93:19052
type: 61.3.186.40:61664
type: 192.168.1.4:61664
type: 121.162.18.216:32522
type: 201.18.210.216:42556
type: 195.16.79.94:28492
type: 46.8.242.253:7506
type: 152.53.45.107:7139
type: 92.126.116.42:29052
type: 54.194.135.233:6892
type: 201.24.232.19:43036
type: 5.135.156.163:56843
type: 152.53.45.107:6883
type: 109.87.177.43:43567
type: 109.184.232.19:6884
type: 89.22.226.106:6884
type: 89.149.200.91:31055
type: 221.153.239.86:40740
type: 194.29.101.83:10240
type: 195.170.172.38:10240
type: 152.53.45.107:7193
type: 137.74.95.127:14708
type: 61.84.168.182:8185
type: 91.225.39.174:45091
type: 47.16.165.212:43449
type: 46.117.212.1:44271
type: 195.154.167.107:8683
type: 106.245.218.168:40800
type: 5.39.85.82:55428
type: 178.162.173.172:28009
type: 114.146.7.131:40095
type: 185.203.56.57:61150
type: 52.53.166.69:21332
type: 78.105.216.39:50321
type: 162.250.172.201:55424
type: 178.65.209.71:14861
type: 188.255.102.176:61850
type: 80.64.26.223:1639
type: 76.22.79.4:52596
type: 86.131.70.57:15021
type: 2.154.247.222:24547
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw
Score:
72 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to persist itself using cron
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1706837 Sample: aarch64.elf Startdate: 05/06/2025 Architecture: LINUX Score: 72 38 5.18.236.117, 3542, 6881 ZTELECOM-ASRU Russian Federation 2->38 40 170.244.29.167, 4409, 6881 WSNETTELECOMLTDAMEBR Brazil 2->40 42 102 other IPs or domains 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Connects to many ports of the same IP (likely port scanning) 2->46 48 Uses known network protocols on non-standard ports 2->48 10 aarch64.elf 2->10         started        signatures3 process4 process5 12 aarch64.elf sh 10->12         started        14 aarch64.elf 10->14         started        17 aarch64.elf sh 10->17         started        signatures6 19 sh crontab 12->19         started        23 sh 12->23         started        56 Opens /sys/class/net/* files useful for querying network interface information 14->56 58 Sample reads /proc/mounts (often used for finding a writable filesystem) 14->58 25 aarch64.elf 14->25         started        27 sh crontab 17->27         started        process7 file8 36 /var/spool/cron/crontabs/tmp.PkdTZf, ASCII 19->36 dropped 50 Sample tries to persist itself using cron 19->50 52 Executes the "crontab" command typically for achieving persistence 19->52 29 sh crontab 23->29         started        32 aarch64.elf 25->32         started        signatures9 process10 signatures11 54 Executes the "crontab" command typically for achieving persistence 29->54 34 aarch64.elf 32->34         started        process12
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-06-05 05:43:51 UTC
File Type:
ELF64 Little (Exe)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 8e7c44b6cdbf75b384417c902ce5c6dff8f97b3e60acaff6b47adcf5586d5800

(this sample)

  
Delivery method
Distributed via web download

Comments