MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 90bb2f757a69f36e2b9513deee12a8d53f991cd8be976dc79fc705d99c55b9a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 90bb2f757a69f36e2b9513deee12a8d53f991cd8be976dc79fc705d99c55b9a8
SHA3-384 hash: a8048ec63720de670c0d6d33b8308f0e206d3c383591af568503410bc2eb82b031558137aeb61732845efa1c180228f0
SHA1 hash: 0f9e4e912ab69b672a7a2e0955829d0a99c5a934
MD5 hash: 3d1b4b8006e1b857e5fa309eac87a7eb
humanhash: zulu-west-triple-helium
File name:i686
Download: download sample
File size:587'764 bytes
First seen:2025-07-12 00:19:31 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 12288:5D+Azf/CVCW3ISw+hRNb3W/aTyA9VV/cZWLnR98V+G:5D+AznCVNIZ+vNbG/WYWrR98V
TLSH T1FBC42241EAB7C0F2F65349320103E7BF8F33C9099165D2A6D742F661EDB1B424A9E66C
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
13
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Receives data from a server
Locks files
Creates directories
Opens a port
Creating a file in the %temp% directory
Collects information on the CPU
Launching a process
DNS request
Connection attempt
Runs as daemon
Changes access rights for a written file
Creating a file
Sends data to a server
Creating a process from a recently created file
Changes the time when the file was created, accessed, or modified
Creates or modifies files in /cron to set up autorun
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
exploit gcc lolbin packed remote
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
true
Architecture:
x86
Packer:
custom
Botnet:
unknown
Number of open files:
72
Number of processes launched:
10
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
Anti-VM
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.123:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 89.179.246.14:6881
type: 91.121.148.35:6881
type: 37.204.207.234:6881
type: 216.128.97.44:6881
type: 112.87.174.49:6881
type: 51.15.174.132:6881
type: 188.182.61.2:6881
type: 114.173.5.164:6881
type: 159.250.62.84:6881
type: 180.3.233.242:6881
type: 188.32.255.132:6881
type: 194.113.45.232:6881
type: 175.214.245.172:6881
type: 5.188.154.78:6881
type: 72.219.136.101:6881
type: 183.33.242.51:6881
type: 81.6.39.75:6881
type: 217.162.124.26:6881
type: 18.220.82.190:6881
type: 51.146.174.41:6881
type: 2.96.108.136:6881
type: 175.163.80.100:6881
type: 47.26.161.131:6881
type: 54.214.105.212:6881
type: 109.182.68.109:6881
type: 35.167.186.212:6881
type: 35.163.251.58:6881
type: 107.181.234.235:6881
type: 54.214.62.55:6881
type: 90.91.224.141:6881
type: 46.162.32.159:6881
type: 82.17.11.120:6881
type: 135.181.238.57:50000
type: 65.21.128.209:50000
type: 65.21.129.60:50000
type: 37.27.104.47:50000
type: 37.27.119.116:50000
type: 37.27.103.245:50000
type: 37.27.117.184:50000
type: 37.27.117.119:50000
type: 65.109.80.166:50000
type: 95.216.13.168:50000
type: 95.217.194.38:50000
type: 37.27.103.251:50000
type: 65.21.128.236:50000
type: 65.109.27.170:50000
type: 37.27.119.182:50000
type: 37.27.117.114:50000
type: 37.27.117.188:50000
type: 195.201.153.69:50000
type: 37.27.119.125:50000
type: 37.27.117.247:50000
type: 65.21.125.163:50000
type: 142.132.193.99:50000
type: 37.27.104.53:50000
type: 37.27.117.118:50000
type: 37.27.117.122:50000
type: 37.27.104.48:50000
type: 37.27.117.117:50000
type: 65.21.129.40:50000
type: 135.181.227.246:50000
type: 37.27.104.55:50000
type: 135.181.238.119:50000
type: 37.27.103.181:50000
type: 142.132.207.62:50000
type: 37.27.117.126:50000
type: 65.109.25.29:50000
type: 37.27.119.239:50000
type: 37.27.119.112:50000
type: 144.76.164.145:50000
type: 65.21.33.212:50000
type: 37.27.117.185:50000
type: 65.21.129.49:50000
type: 65.109.67.177:50000
type: 65.21.129.43:50000
type: 65.109.111.182:50000
type: 65.21.128.227:50000
type: 37.27.107.120:50000
type: 65.21.129.62:50000
type: 65.21.125.167:50000
type: 135.181.238.58:50000
type: 37.27.107.121:50000
type: 65.21.128.232:50000
type: 65.21.129.54:50000
type: 37.27.117.182:50000
type: 135.181.227.244:50000
type: 135.181.118.208:50000
type: 135.181.238.120:50000
type: 142.132.203.125:50000
type: 65.21.125.179:50000
type: 65.109.115.71:50000
type: 142.132.193.161:50000
type: 148.251.123.231:50000
type: 37.27.117.53:50000
type: 135.181.238.121:50000
type: 95.217.194.55:50000
type: 37.27.117.116:50000
type: 65.21.196.126:50000
type: 65.21.129.55:50000
type: 178.162.174.149:28001
type: 178.162.174.170:28001
type: 130.239.18.158:8524
type: 178.162.173.111:28008
type: 178.162.173.41:28008
type: 178.162.173.6:28008
type: 195.201.179.130:16309
type: 130.239.18.158:8580
type: 130.239.18.158:8500
type: 130.239.18.158:8516
type: 88.87.85.234:51413
type: 188.127.171.164:51413
type: 194.44.45.138:51413
type: 95.211.81.107:51413
type: 94.190.112.28:51413
type: 178.128.114.125:51413
type: 64.20.33.102:51413
type: 82.67.77.161:51413
type: 5.79.73.164:51413
type: 73.2.57.210:51413
type: 175.177.45.35:51413
type: 41.136.160.172:51413
type: 37.187.125.110:51413
type: 86.86.97.166:51413
type: 218.41.145.67:51413
type: 42.236.148.162:51413
type: 176.31.250.104:51413
type: 67.220.85.98:6925
type: 159.203.67.164:8000
type: 69.87.207.136:9118
type: 51.112.110.177:20895
type: 178.162.173.9:28012
type: 83.149.98.185:28012
type: 178.162.173.159:28005
type: 178.162.174.41:28005
type: 178.162.173.166:28006
type: 178.162.174.7:28006
type: 178.162.173.23:28006
type: 69.164.203.179:6880
type: 195.154.233.74:6880
type: 45.203.155.80:6880
type: 3.130.230.203:6880
type: 3.16.242.66:6880
type: 34.235.218.124:6880
type: 3.17.246.178:6880
type: 130.239.18.158:8565
type: 130.239.18.158:8597
type: 84.17.42.249:47955
type: 149.34.245.152:47955
type: 5.79.93.242:61920
type: 86.26.94.230:30523
type: 71.231.40.255:32220
type: 178.162.174.47:28010
type: 178.162.173.105:28010
type: 91.199.227.105:15749
type: 192.42.116.244:34445
type: 45.154.87.227:50001
type: 195.154.172.179:26350
type: 37.27.113.233:52042
type: 188.214.31.15:1027
type: 83.139.167.178:1027
type: 185.203.56.50:11465
type: 178.162.173.91:28003
type: 130.239.18.158:8513
type: 121.128.106.52:33011
type: 178.162.174.5:28015
type: 162.251.63.120:10068
type: 178.162.173.144:28000
type: 178.162.173.166:28000
type: 185.203.56.51:12996
type: 178.63.60.244:51193
type: 211.231.49.202:33084
type: 15.204.107.67:8080
type: 69.50.95.40:10000
type: 109.109.47.112:10000
type: 178.162.174.173:28016
type: 200.192.102.133:16397
type: 178.162.174.222:28014
type: 178.162.174.43:28004
type: 130.239.18.158:8515
type: 5.2.73.209:6951
type: 213.89.20.227:12303
type: 46.232.210.48:21109
type: 46.232.211.179:16759
type: 31.208.54.10:49001
type: 85.245.51.27:49001
type: 178.68.82.97:49001
type: 14.9.118.0:64464
type: 222.154.89.119:8953
type: 86.98.78.238:62880
type: 46.232.211.201:63725
type: 185.203.56.69:29901
type: 187.126.18.75:31111
type: 37.48.95.31:52250
type: 5.79.69.185:28013
type: 178.162.174.105:28013
type: 35.132.81.103:31922
type: 185.21.217.78:61852
type: 46.232.211.152:64234
type: 153.221.70.82:15041
type: 89.149.197.229:48199
type: 138.255.233.88:63164
type: 158.247.221.152:50007
type: 2.102.174.75:41981
type: 93.103.58.201:6889
type: 183.99.141.86:8112
type: 176.114.244.14:54124
type: 220.81.252.7:7749
type: 73.166.38.160:29270
type: 141.70.44.84:51416
type: 45.87.251.11:28072
type: 47.205.143.236:9084
type: 37.237.222.3:4325
type: 176.63.21.17:14830
type: 24.209.254.228:61963
type: 93.126.82.225:30125
type: 78.190.15.241:9775
type: 61.84.45.7:8189
type: 119.196.186.205:32868
type: 81.152.4.50:33667
type: 188.165.242.169:57715
type: 49.228.107.34:56579
type: 54.194.135.233:6992
type: 54.209.131.199:6992
type: 35.171.49.86:6992
type: 54.38.92.16:59883
type: 152.53.45.107:6987
type: 45.172.165.183:40570
type: 67.81.197.255:43852
type: 222.232.181.12:7844
type: 186.23.232.73:63148
type: 105.99.3.104:34954
type: 177.244.104.42:47011
type: 191.7.203.53:28023
type: 176.31.182.150:58269
type: 208.87.240.21:11162
type: 178.162.173.220:28011
type: 54.209.131.199:6892
type: 37.27.113.233:39536
type: 176.31.183.98:54055
type: 47.89.251.173:7777
type: 162.251.63.120:10011
type: 89.134.31.230:5293
type: 185.21.217.13:53453
type: 217.92.129.98:47269
type: 46.232.211.210:14559
type: 195.154.172.179:27656
type: 75.155.236.169:17401
type: 54.39.52.64:64804
type: 176.63.29.45:10479
type: 31.94.0.6:54146
type: 121.174.167.188:33063
type: 187.99.109.203:46478
type: 72.238.245.13:21581
type: 1.161.174.183:7880
type: 89.203.49.10:58964
type: 125.132.130.107:41250
type: 46.232.211.167:13359
type: 73.225.86.243:60567
type: 189.253.121.227:22538
type: 122.116.138.74:26366
Status:
terminated
Behavior Graph:
%3 guuid=aa8e7e8e-1a00-0000-6231-d4e8a60b0000 pid=2982 /usr/bin/sudo guuid=5fe71e91-1a00-0000-6231-d4e8ab0b0000 pid=2987 /root/.sys/configuration guuid=aa8e7e8e-1a00-0000-6231-d4e8a60b0000 pid=2982->guuid=5fe71e91-1a00-0000-6231-d4e8ab0b0000 pid=2987 execve guuid=044c5091-1a00-0000-6231-d4e8ac0b0000 pid=2988 /usr/bin/dash guuid=5fe71e91-1a00-0000-6231-d4e8ab0b0000 pid=2987->guuid=044c5091-1a00-0000-6231-d4e8ac0b0000 pid=2988 execve guuid=0cc6ff91-1a00-0000-6231-d4e8af0b0000 pid=2991 /usr/bin/dash guuid=5fe71e91-1a00-0000-6231-d4e8ab0b0000 pid=2987->guuid=0cc6ff91-1a00-0000-6231-d4e8af0b0000 pid=2991 execve guuid=4e414992-1a00-0000-6231-d4e8b20b0000 pid=2994 /root/.sys/configuration zombie guuid=5fe71e91-1a00-0000-6231-d4e8ab0b0000 pid=2987->guuid=4e414992-1a00-0000-6231-d4e8b20b0000 pid=2994 clone guuid=38a42792-1a00-0000-6231-d4e8b00b0000 pid=2992 /usr/bin/dash guuid=0cc6ff91-1a00-0000-6231-d4e8af0b0000 pid=2991->guuid=38a42792-1a00-0000-6231-d4e8b00b0000 pid=2992 clone guuid=27992d92-1a00-0000-6231-d4e8b10b0000 pid=2993 /usr/bin/dash guuid=0cc6ff91-1a00-0000-6231-d4e8af0b0000 pid=2991->guuid=27992d92-1a00-0000-6231-d4e8b10b0000 pid=2993 clone guuid=d55a359c-1a00-0000-6231-d4e8c90b0000 pid=3017 /root/.sys/configuration guuid=4e414992-1a00-0000-6231-d4e8b20b0000 pid=2994->guuid=d55a359c-1a00-0000-6231-d4e8c90b0000 pid=3017 clone guuid=f900459c-1a00-0000-6231-d4e8ca0b0000 pid=3018 /root/.sys/configuration guuid=d55a359c-1a00-0000-6231-d4e8c90b0000 pid=3017->guuid=f900459c-1a00-0000-6231-d4e8ca0b0000 pid=3018 clone guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019 /root/.sys/configuration dns net net-scan send-data guuid=f900459c-1a00-0000-6231-d4e8ca0b0000 pid=3018->guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019 clone d316b2ae-0a7e-5b43-8de6-745900c90c54 127.0.0.1:65535 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->d316b2ae-0a7e-5b43-8de6-745900c90c54 con 38a4910e-6f05-5afe-a8e3-398c2eb18329 time.cloudflare.com:123 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->38a4910e-6f05-5afe-a8e3-398c2eb18329 send: 48B 95f09ea6-bfe9-52ed-89e4-b52b62f4e933 31.200.249.227:31943 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->95f09ea6-bfe9-52ed-89e4-b52b62f4e933 send: 68B 8b9e9eb2-a5ac-5194-963c-da9481f8aa7e 109.173.57.170:43834 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->8b9e9eb2-a5ac-5194-963c-da9481f8aa7e con a7c45dda-c52b-509b-ae32-e2f941990fff 209.38.196.30:6812 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->a7c45dda-c52b-509b-ae32-e2f941990fff con 4997cb38-a540-5fb4-bd33-bed973b88f05 223.167.96.208:43834 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->4997cb38-a540-5fb4-bd33-bed973b88f05 con f58971e1-c25a-5266-b420-718501f3f010 159.65.200.220:6812 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->f58971e1-c25a-5266-b420-718501f3f010 con 2981c89d-db8c-55a0-b9ae-c66819bfe370 172.73.199.182:43834 guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->2981c89d-db8c-55a0-b9ae-c66819bfe370 con guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019|send-data send-data to 288 IP addresses review logs to see them all guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019->guuid=0ff3539c-1a00-0000-6231-d4e8cb0b0000 pid=3019|send-data send
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw
Score:
64 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1734418 Sample: i686.elf Startdate: 12/07/2025 Architecture: LINUX Score: 64 38 50.38.48.148, 51413 ZIPLY-FIBER-LEGACY-ASNUS United States 2->38 40 84.66.244.43, 6881 VodafoneGB United Kingdom 2->40 42 102 other IPs or domains 2->42 44 Multi AV Scanner detection for submitted file 2->44 10 i686.elf configuration 2->10         started        signatures3 process4 process5 12 i686.elf sh 10->12         started        14 configuration 10->14         started        17 i686.elf sh 10->17         started        signatures6 19 sh crontab 12->19         started        23 sh 12->23         started        52 Opens /sys/class/net/* files useful for querying network interface information 14->52 54 Sample reads /proc/mounts (often used for finding a writable filesystem) 14->54 25 configuration 14->25         started        27 sh crontab 17->27         started        process7 file8 36 /var/spool/cron/crontabs/tmp.uwK58a, ASCII 19->36 dropped 46 Sample tries to persist itself using cron 19->46 48 Executes the "crontab" command typically for achieving persistence 19->48 29 sh crontab 23->29         started        32 configuration 25->32         started        signatures9 process10 signatures11 50 Executes the "crontab" command typically for achieving persistence 29->50 34 configuration 32->34         started        process12
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-07-12 00:20:24 UTC
File Type:
ELF32 Little (Exe)
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
execution linux persistence privilege_escalation rootkit
Behaviour
Creates/modifies Cron job
Loads a kernel module
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 90bb2f757a69f36e2b9513deee12a8d53f991cd8be976dc79fc705d99c55b9a8

(this sample)

  
Delivery method
Distributed via web download

Comments