MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a972d18300270d54a9ff831af150aa1fb4e7c319dba4fc9dac07b3af756aee05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: a972d18300270d54a9ff831af150aa1fb4e7c319dba4fc9dac07b3af756aee05
SHA3-384 hash: 5ce623905aab2f8727d44696eae42a8d434c751b9d9aab1171d934b832b4042e1438f0145962a654a6c9ad25ec0f328e
SHA1 hash: dbd736e3f0d3197a65416dea798244188ff25d5e
MD5 hash: a48a9195e7466ef1d7747bb9612a8648
humanhash: winter-tennessee-nebraska-fifteen
File name:arm7
Download: download sample
File size:1'298'976 bytes
First seen:2025-10-27 22:24:46 UTC
Last seen:2025-10-28 15:15:49 UTC
File type: elf
MIME type:application/x-executable
ssdeep 24576:76iBlT5cn+YUJCMEBG7lBE2lTCf7X81omWAP5g8oNL8l4PpPqH6eZSny:HjVYWCxFo1omRJoN9E6s7
TLSH T13D553361FE21113DD8A1EA05FB5F3D0A35C7C611C8579933BB498BA670C688763E8B9C
telfhash t127b01103a00c02c2c3203ceeeb0b3b2ba200e033ca32e03a0328e022803800008c2003
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
2
# of downloads :
29
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
packed threat upx
Verdict:
Adware
File Type:
elf.32.le
First seen:
2025-10-27T19:50:00Z UTC
Last seen:
2025-10-27T20:15:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=1c10898e-1600-0000-8e9d-7d637a0f0000 pid=3962 /usr/bin/sudo guuid=a4197390-1600-0000-8e9d-7d63830f0000 pid=3971 /tmp/sample.bin guuid=1c10898e-1600-0000-8e9d-7d637a0f0000 pid=3962->guuid=a4197390-1600-0000-8e9d-7d63830f0000 pid=3971 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
64 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Executes the "iptables" command to insert, remove and/or manipulate rules
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1802781 Sample: arm7.elf Startdate: 27/10/2025 Architecture: LINUX Score: 64 48 Multi AV Scanner detection for submitted file 2->48 50 Sample is packed with UPX 2->50 8 arm7.elf 2->8         started        10 dash rm 2->10         started        12 dash cut 2->12         started        14 8 other processes 2->14 process3 process4 16 arm7.elf 8->16         started        process5 18 arm7.elf sh 16->18         started        20 arm7.elf sh 16->20         started        22 arm7.elf sh 16->22         started        24 arm7.elf 16->24         started        process6 26 sh crontab 18->26         started        30 sh crontab 18->30         started        32 sh 18->32         started        34 sh iptables 20->34         started        36 sh iptables 20->36         started        44 2 other processes 20->44 38 sh iptables 22->38         started        40 sh iptables 22->40         started        42 arm7.elf 24->42         started        file7 46 /var/spool/cron/crontabs/tmp.3p5wCQ, ASCII 26->46 dropped 52 Sample tries to persist itself using cron 26->52 54 Executes the "crontab" command typically for achieving persistence 26->54 56 Executes the "iptables" command to insert, remove and/or manipulate rules 38->56 signatures8
Threat name:
Linux.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-27 22:26:02 UTC
File Type:
ELF32 Little (Exe)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
antivm discovery execution persistence privilege_escalation upx
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Changes its process name
Checks CPU configuration
Reads CPU attributes
Creates/modifies Cron job
Enumerates running processes
Reads network interface configuration
Creates Raw socket
Contacts a large (379871) amount of remote hosts
Creates a large amount of network flows
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf a972d18300270d54a9ff831af150aa1fb4e7c319dba4fc9dac07b3af756aee05

(this sample)

  
Delivery method
Distributed via web download

Comments