MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 993f365a68d967970d823ec05e5fb12e201aaa9151a5eda64d2809cfc20ac74e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 993f365a68d967970d823ec05e5fb12e201aaa9151a5eda64d2809cfc20ac74e
SHA3-384 hash: 8094466d41ed184819e0dfb43af4e5e132ce61f5d7b8f9a584aeb949d3053e8a808c1cc4c9cb35c57520f4b9d434105f
SHA1 hash: e8cb8f8871a7272902a569dcd19f6ea6cbacdb37
MD5 hash: 97782b12926c7d169dbca2a29541fa76
humanhash: minnesota-violet-sad-twelve
File name:kworker_u8
Download: download sample
File size:1'992'744 bytes
First seen:2026-05-16 19:29:39 UTC
Last seen:2026-05-17 01:25:28 UTC
File type: elf
MIME type:application/x-executable
ssdeep 49152:54pDdq8njFPIP1MgraG6m9Bc5OrdXTMVVWRjG3:54pDdNRPIOgeG6mfc5OrdTMVVW9G3
TLSH T15D95335D5C9CCEFCDEE88D2C3AC98083B352C427EA4FC5511372932951B46859ABE7A3
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
3
# of downloads :
20
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
custom
Botnet:
unknown
Number of open files:
62
Number of processes launched:
12
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=521b13d5-1900-0000-9c1d-235253090000 pid=2387 /usr/bin/sudo guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391 /tmp/sample.bin write-file guuid=521b13d5-1900-0000-9c1d-235253090000 pid=2387->guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391 execve guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2470 /tmp/sample.bin guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391->guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2470 clone guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2472 /tmp/sample.bin guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391->guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2472 clone guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2473 /tmp/sample.bin guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391->guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2473 clone guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2474 /tmp/sample.bin guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391->guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2474 clone guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2475 /tmp/sample.bin guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391->guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2475 clone guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476 /tmp/sample.bin write-file zombie guuid=b8107dd7-1900-0000-9c1d-235257090000 pid=2391->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476 execve guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2536 /tmp/sample.bin zombie guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2536 clone guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2537 /tmp/sample.bin guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2537 clone guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2538 /tmp/sample.bin guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2538 clone guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2539 /tmp/sample.bin net send-data write-file zombie guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2539 clone guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2540 /tmp/sample.bin guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2540 clone guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2541 /tmp/sample.bin net send-data write-file zombie guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2541 clone guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2542 /tmp/sample.bin dns net send-data zombie guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2476->guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2542 clone 4f6baed0-9587-596c-82b3-fd721afe4cc1 10.0.2.3:53 guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2539->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 49B 68be2212-4fc4-5131-93cb-d738da932b65 speed.cloudflare.com:80 guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2539->68be2212-4fc4-5131-93cb-d738da932b65 send: 84B 7f71f5af-229e-50a3-8e9d-245aa3e54121 173.208.51.53:443 guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2539->7f71f5af-229e-50a3-8e9d-245aa3e54121 send: 1453B guuid=d4807520-1a00-0000-9c1d-2352f2090000 pid=2546 /tmp/sample.bin guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2539->guuid=d4807520-1a00-0000-9c1d-2352f2090000 pid=2546 clone guuid=4dbb8020-1a00-0000-9c1d-2352f3090000 pid=2547 /usr/bin/bash guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2539->guuid=4dbb8020-1a00-0000-9c1d-2352f3090000 pid=2547 execve guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2541->4f6baed0-9587-596c-82b3-fd721afe4cc1 send: 49B guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2541->7f71f5af-229e-50a3-8e9d-245aa3e54121 con guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2542->68be2212-4fc4-5131-93cb-d738da932b65 con guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2542->7f71f5af-229e-50a3-8e9d-245aa3e54121 send: 225B b619669b-6add-5aba-88d3-b4e40271df50 speed.cloudflare.com:53 guuid=1781ce05-1a00-0000-9c1d-2352ac090000 pid=2542->b619669b-6add-5aba-88d3-b4e40271df50 con guuid=4ef6e920-1a00-0000-9c1d-2352f6090000 pid=2550 /usr/bin/bash guuid=4dbb8020-1a00-0000-9c1d-2352f3090000 pid=2547->guuid=4ef6e920-1a00-0000-9c1d-2352f6090000 pid=2550 clone guuid=6169f220-1a00-0000-9c1d-2352f7090000 pid=2551 /usr/bin/bash guuid=4dbb8020-1a00-0000-9c1d-2352f3090000 pid=2547->guuid=6169f220-1a00-0000-9c1d-2352f7090000 pid=2551 clone guuid=5437f820-1a00-0000-9c1d-2352f8090000 pid=2552 /usr/bin/bash guuid=4ef6e920-1a00-0000-9c1d-2352f6090000 pid=2550->guuid=5437f820-1a00-0000-9c1d-2352f8090000 pid=2552 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj
Score:
56 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1914492 Sample: kworker_u8.elf Startdate: 16/05/2026 Architecture: LINUX Score: 56 32 173.208.51.53, 443, 47056 LEASEWEB-USA-SEA-10US United States 2->32 34 speed.cloudflare.com 162.159.140.220, 42870, 80 CLOUDFLARENETUS United States 2->34 36 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->36 40 Multi AV Scanner detection for submitted file 2->40 10 kworker_u8.elf 2->10         started        signatures3 process4 process5 12 kworker_u8.elf kworker_u8.elf 10->12         started        process6 14 kworker_u8.elf bash 12->14         started        16 kworker_u8.elf crontab 12->16         started        19 kworker_u8.elf 12->19         started        signatures7 21 bash crontab 14->21         started        25 bash 14->25         started        38 Executes the "crontab" command typically for achieving persistence 16->38 process8 file9 30 /var/spool/cron/crontabs/tmp.bk7pgJ, ASCII 21->30 dropped 42 Sample tries to persist itself using cron 21->42 44 Executes the "crontab" command typically for achieving persistence 21->44 27 bash crontab 25->27         started        signatures10 process11 signatures12 46 Executes the "crontab" command typically for achieving persistence 27->46
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery execution linux persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Creates/modifies Cron job
Enumerates running processes
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
Rule name:upx_antiunpack_elf64
Author:JPCERT/CC Incident Response Group
Description:UPX Anti-Unpacking technique to magic renamed for ELF64

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 993f365a68d967970d823ec05e5fb12e201aaa9151a5eda64d2809cfc20ac74e

(this sample)

  
Delivery method
Distributed via web download

Comments