MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d70d33f599b92639c7d852f87610e9863aa1e275967a6d054895b81a942fb8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: 9d70d33f599b92639c7d852f87610e9863aa1e275967a6d054895b81a942fb8b
SHA3-384 hash: b04ad17668563644d55ca3050f88533d4603d224f492883f0db136f69c3fc380a843d040c4be39b61c9a9ed851c8ac70
SHA1 hash: 0760b8bdda935c0161694c49ef362c76d4f9c12c
MD5 hash: 41e3b4b942b8612d5ccb484400e68ced
humanhash: delta-eight-red-nineteen
File name:dlr.x86_64
Download: download sample
File size:797'984 bytes
First seen:2026-02-13 10:21:28 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 12288:5jaM2VIru6GVgGSLDnn4LasPjytyyC/BXtreI:FaM2VT6GVgG2Dn4LaEt
TLSH T192056C17B2F330FCD16BC030479BDB636975F46A01216EBB21C4AA352D52EA12729F67
telfhash t1f17178384af638f4a2d7c911b315e4f4ba772d7776f939a026166d84ef00f914ca2423
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 503af7e2b3fdf47fa0333c73f5e83d3a666a6c0a9b2f13c64fb1d6999e0a0c3f
File size (compressed) :291'608 bytes
File size (de-compressed) :797'984 bytes
Format:linux/amd64
Packed file: 503af7e2b3fdf47fa0333c73f5e83d3a666a6c0a9b2f13c64fb1d6999e0a0c3f

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
gcc
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
0
Number of processes launched:
2
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
type:Mirai 85.120.81.158:18916
UDP botnet C2(s):
not identified
Verdict:
Adware
File Type:
elf.64.le
First seen:
2026-02-13T08:26:00Z UTC
Last seen:
2026-02-13T08:41:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=a1441b97-1a00-0000-42ae-7df8120b0000 pid=2834 /usr/bin/sudo guuid=1b570c9a-1a00-0000-42ae-7df8190b0000 pid=2841 /tmp/sample.bin guuid=a1441b97-1a00-0000-42ae-7df8120b0000 pid=2834->guuid=1b570c9a-1a00-0000-42ae-7df8190b0000 pid=2841 execve guuid=fdc4f89d-1a00-0000-42ae-7df81a0b0000 pid=2842 /tmp/sample.bin net send-data zombie guuid=1b570c9a-1a00-0000-42ae-7df8190b0000 pid=2841->guuid=fdc4f89d-1a00-0000-42ae-7df81a0b0000 pid=2842 clone 9a879bbc-4172-50bb-9ccc-3f2fec1498e9 77.88.8.8:53 guuid=fdc4f89d-1a00-0000-42ae-7df81a0b0000 pid=2842->9a879bbc-4172-50bb-9ccc-3f2fec1498e9 con bb069c8b-4c58-560a-bbbf-f43a155962e9 85.120.81.158:18916 guuid=fdc4f89d-1a00-0000-42ae-7df81a0b0000 pid=2842->bb069c8b-4c58-560a-bbbf-f43a155962e9 send: 7B
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Malicious sample detected (through community Yara rule)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1869020 Sample: dlr.x86_64.elf Startdate: 13/02/2026 Architecture: LINUX Score: 48 17 169.254.169.254, 80 USDOSUS Reserved 2->17 19 85.120.81.158, 18916, 48018 RTDBucharestRomaniaRO Romania 2->19 21 4 other IPs or domains 2->21 23 Malicious sample detected (through community Yara rule) 2->23 7 dlr.x86_64.elf 2->7         started        9 dash rm 2->9         started        11 dash rm 2->11         started        13 python3.8 dpkg 2->13         started        signatures3 process4 process5 15 dlr.x86_64.elf 7->15         started       
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Mirai_d5f2abe2
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 9d70d33f599b92639c7d852f87610e9863aa1e275967a6d054895b81a942fb8b

(this sample)

Comments