MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4e560c61861c4c3d6d614217d93f38fadea8ee6b127ccd85618ff4312582600. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 10 File information Comments

SHA256 hash: a4e560c61861c4c3d6d614217d93f38fadea8ee6b127ccd85618ff4312582600
SHA3-384 hash: 281e25b336b7d7a117267f21f1b6182eee623b4e3cfa3945335a5e8228a813b22104c5c65e497be34c93e0fb2242f58e
SHA1 hash: 74dc5b6955680d9a3836578bdb68cc1546e3f699
MD5 hash: 7ab0e9a6bf173d25aad46b4bfb319f42
humanhash: network-oregon-pasta-north
File name:bot.x86_64
Download: download sample
File size:3'123'880 bytes
First seen:2026-05-11 20:39:24 UTC
Last seen:Never
File type: elf
MIME type:application/x-sharedlib
ssdeep 49152:EklkmPiU7w6QWskVg5Bf8dmrz8I6sQA6PhIU6iZ+AtAC:Gaw645BE287LW+Z+o
TLSH T15DE57D17F5B104ADDDBECC78834EE573EA2978898112712B7BE49B012F26E249F0D761
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter smica83
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
HU HU
Vendor Threat Intelligence
No detections
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
base64 expand gcc lolbin
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
2
Number of processes launched:
2
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.64.le
First seen:
2026-05-11T14:17:00Z UTC
Last seen:
2026-05-12T07:00:00Z UTC
Hits:
~100
Status:
terminated
Behavior Graph:
%3 guuid=606c8d82-1600-0000-653a-4df8460e0000 pid=3654 /usr/bin/sudo guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655 /tmp/sample.bin dns net send-data guuid=606c8d82-1600-0000-653a-4df8460e0000 pid=3654->guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655 execve c5152ea2-3d6f-57dd-8e22-ec82706dabc7 af2f0177f4cbece5d.awsglobalaccelerator.com:443 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->c5152ea2-3d6f-57dd-8e22-ec82706dabc7 send: 224B 0dbc178a-fdef-5278-82a3-e845a981e17f eth-mainnet.public.blastapi.io:443 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->0dbc178a-fdef-5278-82a3-e845a981e17f send: 1807B 3ca9afc9-4ebf-5613-97ae-fc26a78161e5 ethereum-rpc.publicnode.com:443 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->3ca9afc9-4ebf-5613-97ae-fc26a78161e5 send: 674B c33c2c1d-491e-5d97-bf02-6d24fdb39be7 0xrpc.io:443 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->c33c2c1d-491e-5d97-bf02-6d24fdb39be7 send: 831B 857867f2-1aca-52a9-bcd0-4193b8c23c3e eth.merkle.io:443 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->857867f2-1aca-52a9-bcd0-4193b8c23c3e send: 838B 1510ba70-f32f-5cb7-bf6f-2883815a7402 1rpc.io:443 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->1510ba70-f32f-5cb7-bf6f-2883815a7402 send: 829B 54d92a3b-1447-55af-b534-047898c60c8d 1.1.1.1:53 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->54d92a3b-1447-55af-b534-047898c60c8d send: 440B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3668 /tmp/sample.bin send-data guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3668 clone guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669 /tmp/sample.bin dns net send-data guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669 clone guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3670 /tmp/sample.bin net send-data guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3670 clone guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3671 /tmp/sample.bin net send-data guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3655->guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3671 clone 6d328acf-fbf5-5eb8-83f3-8cb034ca2a05 ::ffff:158.94.208.131:4433 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3668->6d328acf-fbf5-5eb8-83f3-8cb034ca2a05 send: 4180B 19dc97e2-40ba-5800-a90e-0b434cbd6e13 ::ffff:130.78.217.194:4433 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3668->19dc97e2-40ba-5800-a90e-0b434cbd6e13 send: 2664B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669->54d92a3b-1447-55af-b534-047898c60c8d send: 88B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669->6d328acf-fbf5-5eb8-83f3-8cb034ca2a05 send: 1546B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669->19dc97e2-40ba-5800-a90e-0b434cbd6e13 send: 1486B c0d9324d-0636-52bc-a71e-9d309e329506 meowzers.chickenkiller.com:80 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669->c0d9324d-0636-52bc-a71e-9d309e329506 con fb9ee57d-ec29-54c0-b2b6-7b4f7cf185f6 bin.stratospherelegends.top:443 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669->fb9ee57d-ec29-54c0-b2b6-7b4f7cf185f6 con 539a8901-f15b-585f-9f2f-2ab2ea779889 ::ffff:37.49.230.40:4433 guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3669->539a8901-f15b-585f-9f2f-2ab2ea779889 send: 5974B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3670->54d92a3b-1447-55af-b534-047898c60c8d send: 90B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3670->6d328acf-fbf5-5eb8-83f3-8cb034ca2a05 send: 1577B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3670->19dc97e2-40ba-5800-a90e-0b434cbd6e13 send: 1799B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3670->c0d9324d-0636-52bc-a71e-9d309e329506 con guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3670->539a8901-f15b-585f-9f2f-2ab2ea779889 send: 2810B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3671->6d328acf-fbf5-5eb8-83f3-8cb034ca2a05 send: 4526B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3671->19dc97e2-40ba-5800-a90e-0b434cbd6e13 send: 3025B guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3671->c0d9324d-0636-52bc-a71e-9d309e329506 con guuid=7ec8c685-1600-0000-653a-4df8470e0000 pid=3671->539a8901-f15b-585f-9f2f-2ab2ea779889 send: 31B
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Suricata IDS alerts for network traffic
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1911935 Sample: bot.x86_64.elf Startdate: 11/05/2026 Architecture: LINUX Score: 48 14 0xrpc.io 146.19.24.104, 43020, 443 FITC-ASUS France 2->14 16 104.20.32.209, 42080, 443 CLOUDFLARENETUS United States 2->16 18 16 other IPs or domains 2->18 20 Suricata IDS alerts for network traffic 2->20 6 dash rm 2->6         started        8 dash rm 2->8         started        10 python3.8 dpkg 2->10         started        12 bot.x86_64.elf 2->12         started        signatures3 process4
Result
Malware family:
n/a
Score:
  4/10
Tags:
discovery linux
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Changes its process name
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:Maskify_EarnifySDK_ELF
Author:Nokia Deepfield ERT
Description:Maskify/Earnify SDK - Rust native proxy+DDoS library (libearnify_sdk.so)
Reference:https://github.com/deepfield/public-research/tree/main/maskify
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf a4e560c61861c4c3d6d614217d93f38fadea8ee6b127ccd85618ff4312582600

(this sample)

  
Delivery method
Distributed via web download

Comments