MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aed2c29fa30ecd330d5f050aca4a27c2d4b82f0056f1d433a194abefad5d835b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: aed2c29fa30ecd330d5f050aca4a27c2d4b82f0056f1d433a194abefad5d835b
SHA3-384 hash: 2924e0cb607603078b32d6715667dc48843179c17fe4e66238f8a506dcfefb817bd5aea34ad358d2a9c148eb35423568
SHA1 hash: a66aaa172c6f5555c3d9c8fa8db27f688d82b702
MD5 hash: 34ee3913a30d7c7542e9dc4c0b9c9db4
humanhash: king-east-alaska-happy
File name:amd64
Download: download sample
File size:482'032 bytes
First seen:2025-06-28 05:10:39 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 12288:iD6LPBCvMk0O9na1M80cLt9i5aIaTtpc4W:2+QGO9naz0Szi5anTtR
TLSH T129A41212E290D8FEC4CAC070469FD27BFD767C544234BC6B6298F7322B3AE601B16A55
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creates directories
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
true
Architecture:
x86
Packer:
custom
Botnet:
unknown
Number of open files:
70
Number of processes launched:
10
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Anti-VM
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.1:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 188.42.55.92:6881
type: 89.207.71.47:6881
type: 176.125.139.123:6881
type: 188.233.25.84:6881
type: 172.96.121.2:6881
type: 159.69.106.195:6881
type: 141.145.201.29:6881
type: 88.204.54.36:6881
type: 5.187.65.136:6881
type: 91.227.217.191:6881
type: 177.221.175.245:6881
type: 78.162.209.58:6881
type: 99.191.44.150:6881
type: 213.246.53.39:6881
type: 188.40.116.123:6881
type: 85.175.96.217:6881
type: 97.177.20.220:6881
type: 90.220.226.56:6881
type: 116.86.43.44:6881
type: 66.169.250.166:6881
type: 176.50.30.92:6881
type: 35.163.251.58:6881
type: 139.162.168.10:6881
type: 109.165.65.244:6881
type: 149.143.80.107:6881
type: 77.82.224.13:6881
type: 71.234.215.92:6881
type: 51.15.20.12:6881
type: 205.209.113.254:6881
type: 217.120.182.24:6881
type: 188.142.80.85:6881
type: 72.53.221.16:6881
type: 69.157.59.93:6881
type: 185.5.143.28:6881
type: 18.218.241.3:6881
type: 151.252.71.59:6881
type: 5.227.24.229:6881
type: 95.79.201.31:6881
type: 13.58.27.33:6881
type: 54.70.174.84:6881
type: 61.76.175.170:6881
type: 77.21.187.107:6881
type: 178.162.173.231:28001
type: 178.162.173.96:28001
type: 45.203.153.79:6880
type: 173.230.130.111:6880
type: 45.203.154.94:6880
type: 45.203.155.80:6880
type: 195.154.233.74:6880
type: 95.168.162.161:42670
type: 130.239.18.158:8539
type: 182.239.203.21:51413
type: 123.113.64.190:51413
type: 86.125.225.80:51413
type: 81.157.67.94:51413
type: 213.248.20.215:51413
type: 173.249.36.217:51413
type: 51.154.26.65:51413
type: 51.91.97.190:51413
type: 134.122.103.46:51413
type: 213.231.5.66:51413
type: 2.97.4.136:51413
type: 120.39.36.172:51413
type: 42.2.235.212:51413
type: 37.187.117.25:51413
type: 109.137.8.19:51413
type: 45.2.62.130:51413
type: 152.70.104.74:51413
type: 86.22.164.3:51413
type: 87.229.251.98:51413
type: 119.4.123.85:51413
type: 93.81.254.253:51413
type: 77.68.83.112:51413
type: 5.79.93.242:61920
type: 219.84.235.215:14459
type: 95.216.116.106:16113
type: 178.162.174.178:28003
type: 178.162.174.236:28003
type: 178.162.173.91:28003
type: 178.162.173.110:28003
type: 89.149.202.17:28003
type: 176.63.6.71:61865
type: 81.171.7.65:28007
type: 178.162.173.32:28007
type: 37.48.118.89:28007
type: 178.162.174.153:28004
type: 178.162.174.85:28004
type: 178.162.173.56:28004
type: 212.7.202.40:28030
type: 178.162.173.229:28010
type: 178.162.173.154:28010
type: 185.149.91.37:51004
type: 178.162.173.69:28014
type: 185.149.91.171:51010
type: 85.17.218.9:48168
type: 37.27.117.121:50000
type: 65.21.33.212:50000
type: 37.27.120.51:50000
type: 162.55.81.219:50000
type: 89.67.73.128:8083
type: 51.178.25.97:8083
type: 185.250.204.85:33291
type: 46.232.210.43:59944
type: 45.87.251.132:28215
type: 83.105.62.43:61249
type: 46.232.211.130:16609
type: 141.95.53.34:8659
type: 195.154.185.217:24115
type: 176.105.193.11:33255
type: 130.239.18.158:8580
type: 130.239.18.158:8516
type: 130.239.18.158:8513
type: 87.207.94.229:6882
type: 152.53.45.107:6882
type: 130.239.18.158:8573
type: 130.239.18.158:8554
type: 130.239.18.158:8510
type: 130.239.18.158:8512
type: 130.239.18.158:8515
type: 5.79.66.11:54337
type: 46.232.210.15:14359
type: 51.15.13.221:65381
type: 46.232.211.79:13259
type: 178.162.173.199:28005
type: 178.162.173.159:28005
type: 195.154.172.179:23188
type: 178.162.174.55:28011
type: 195.154.185.217:25051
type: 195.154.185.217:24155
type: 195.154.185.217:24263
type: 185.203.56.50:59141
type: 46.232.211.167:13109
type: 213.227.152.133:28000
type: 178.162.173.231:28000
type: 185.203.56.73:17490
type: 178.162.174.154:28013
type: 172.111.38.128:26011
type: 23.158.56.119:10063
type: 69.50.95.40:10063
type: 95.168.160.123:28012
type: 178.162.173.32:28012
type: 178.162.174.83:28012
type: 178.162.173.154:28015
type: 162.55.95.146:51555
type: 5.39.85.82:51555
type: 195.20.18.136:11072
type: 60.67.133.157:23359
type: 158.46.254.42:6889
type: 84.64.231.216:6889
type: 186.171.32.221:29574
type: 124.211.135.144:20379
type: 51.75.73.209:8656
type: 81.171.17.63:41749
type: 86.124.25.39:61234
type: 51.75.163.151:8649
type: 88.97.240.175:60624
type: 85.17.170.48:28009
type: 178.162.174.154:28009
type: 104.172.103.220:9010
type: 45.136.229.247:53717
type: 180.33.227.114:17299
type: 95.211.198.95:28002
type: 24.66.117.42:15372
type: 46.232.210.68:64095
type: 46.232.211.140:20159
type: 212.50.102.133:24241
type: 122.150.177.61:49724
type: 193.29.63.50:61024
type: 35.171.49.86:6892
type: 54.77.218.23:6892
type: 2.218.216.8:45731
type: 78.60.164.9:8621
type: 91.228.118.59:8621
type: 83.43.13.29:8621
type: 46.159.145.26:8621
type: 222.114.190.241:41578
type: 138.199.33.242:53512
type: 46.150.33.102:26336
type: 78.58.128.67:22404
type: 102.67.253.114:15802
type: 122.150.183.24:55125
type: 70.234.202.176:9854
type: 186.52.171.42:11326
type: 176.88.21.213:26840
type: 84.54.180.79:60001
type: 161.81.224.36:8524
type: 195.154.176.26:8667
type: 92.98.19.238:55527
type: 188.165.246.171:51526
type: 75.246.92.160:62812
type: 59.148.140.38:25391
type: 51.195.223.60:8648
type: 82.31.218.29:29432
type: 185.203.56.40:59594
type: 72.49.215.173:43440
type: 125.200.61.201:8792
type: 82.65.203.19:50500
type: 102.142.26.67:37363
type: 89.22.226.106:6886
type: 83.253.145.182:29421
type: 218.212.151.160:65000
type: 138.2.55.233:32516
type: 146.59.3.81:10240
type: 194.29.101.83:10240
type: 78.142.231.133:6767
type: 46.232.210.67:14959
type: 5.79.98.163:47232
type: 121.149.144.228:24006
type: 151.251.253.138:27769
type: 77.231.129.150:23090
type: 103.6.151.60:30804
type: 89.152.118.24:50722
type: 37.27.113.233:35855
type: 65.108.143.34:52263
type: 144.76.175.153:35870
type: 37.27.113.233:35881
type: 37.27.113.233:52275
type: 37.27.113.233:52269
type: 197.203.63.215:39423
type: 51.39.3.203:1348
type: 31.211.217.215:557
type: 5.39.85.50:55277
type: 181.136.244.251:49021
type: 160.176.244.184:17548
type: 41.143.102.101:44173
type: 23.162.56.55:10039
type: 212.10.47.56:30640
type: 185.203.56.19:23841
type: 213.91.250.110:30943
type: 216.189.150.94:51419
type: 45.164.77.201:44860
type: 45.14.29.61:19305
type: 72.21.17.2:18986
type: 137.74.200.136:60825
type: 62.73.123.143:40181
type: 94.174.91.142:50237
type: 187.190.167.187:21248
type: 89.134.6.211:23412
type: 45.136.230.185:64274
type: 37.27.113.233:52245
type: 23.158.56.120:16053
type: 5.135.138.216:28533
type: 45.159.90.30:39124
type: 79.23.204.27:61449
type: 142.4.209.161:8999
type: 91.181.74.25:63657
type: 185.203.56.59:16107
Status:
terminated
Behavior Graph:
%3 guuid=939c1985-1700-0000-1433-a94aff0b0000 pid=3071 /usr/bin/sudo guuid=f5c4a187-1700-0000-1433-a94a080c0000 pid=3080 /tmp/sample.bin guuid=939c1985-1700-0000-1433-a94aff0b0000 pid=3071->guuid=f5c4a187-1700-0000-1433-a94a080c0000 pid=3080 execve guuid=5b62d287-1700-0000-1433-a94a090c0000 pid=3081 /usr/bin/dash guuid=f5c4a187-1700-0000-1433-a94a080c0000 pid=3080->guuid=5b62d287-1700-0000-1433-a94a090c0000 pid=3081 execve guuid=7ff30e88-1700-0000-1433-a94a0b0c0000 pid=3083 /usr/bin/dash guuid=f5c4a187-1700-0000-1433-a94a080c0000 pid=3080->guuid=7ff30e88-1700-0000-1433-a94a0b0c0000 pid=3083 execve guuid=92665a88-1700-0000-1433-a94a0e0c0000 pid=3086 /tmp/sample.bin mprotect-exec zombie guuid=f5c4a187-1700-0000-1433-a94a080c0000 pid=3080->guuid=92665a88-1700-0000-1433-a94a0e0c0000 pid=3086 clone guuid=f31a3488-1700-0000-1433-a94a0c0c0000 pid=3084 /usr/bin/dash guuid=7ff30e88-1700-0000-1433-a94a0b0c0000 pid=3083->guuid=f31a3488-1700-0000-1433-a94a0c0c0000 pid=3084 clone guuid=0d463888-1700-0000-1433-a94a0d0c0000 pid=3085 /usr/bin/dash guuid=7ff30e88-1700-0000-1433-a94a0b0c0000 pid=3083->guuid=0d463888-1700-0000-1433-a94a0d0c0000 pid=3085 clone guuid=8a3c1a8c-1700-0000-1433-a94a170c0000 pid=3095 /tmp/sample.bin zombie guuid=92665a88-1700-0000-1433-a94a0e0c0000 pid=3086->guuid=8a3c1a8c-1700-0000-1433-a94a170c0000 pid=3095 clone guuid=bb7f218c-1700-0000-1433-a94a180c0000 pid=3096 /tmp/sample.bin guuid=8a3c1a8c-1700-0000-1433-a94a170c0000 pid=3095->guuid=bb7f218c-1700-0000-1433-a94a180c0000 pid=3096 clone guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097 /tmp/sample.bin dns net net-scan send-data guuid=bb7f218c-1700-0000-1433-a94a180c0000 pid=3096->guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097 clone d316b2ae-0a7e-5b43-8de6-745900c90c54 127.0.0.1:65535 guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097->d316b2ae-0a7e-5b43-8de6-745900c90c54 con 38a4910e-6f05-5afe-a8e3-398c2eb18329 time.cloudflare.com:123 guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097->38a4910e-6f05-5afe-a8e3-398c2eb18329 send: 48B 9dd63430-d353-5d57-a7e8-52c915725e23 31.200.249.233:31771 guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097->9dd63430-d353-5d57-a7e8-52c915725e23 send: 68B c6f71d71-0e8a-5e95-9554-6a19bed9fd21 31.200.249.227:31991 guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097->c6f71d71-0e8a-5e95-9554-6a19bed9fd21 send: 68B 62b3909e-f2fd-5bb8-afba-1f6135e2bb94 45.166.114.234:35556 guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097->62b3909e-f2fd-5bb8-afba-1f6135e2bb94 con b3f906bc-68dc-500d-8cc3-5895f7178f34 78.88.41.49:35556 guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097->b3f906bc-68dc-500d-8cc3-5895f7178f34 con guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097|send-data send-data to 293 IP addresses review logs to see them all guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097->guuid=70b9298c-1700-0000-1433-a94a190c0000 pid=3097|send-data send
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.spyw
Score:
72 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample scans a subnet
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1724536 Sample: amd64.elf Startdate: 28/06/2025 Architecture: LINUX Score: 72 38 82.222.237.77, 53261 TELLCOM-ASTR Turkey 2->38 40 178.162.174.178, 28001, 6881 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 2->40 42 102 other IPs or domains 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Connects to many ports of the same IP (likely port scanning) 2->46 48 Sample scans a subnet 2->48 10 amd64.elf 2->10         started        signatures3 process4 process5 12 amd64.elf sh 10->12         started        14 amd64.elf 10->14         started        17 amd64.elf sh 10->17         started        signatures6 19 sh crontab 12->19         started        23 sh 12->23         started        56 Opens /sys/class/net/* files useful for querying network interface information 14->56 58 Sample reads /proc/mounts (often used for finding a writable filesystem) 14->58 25 amd64.elf 14->25         started        27 sh crontab 17->27         started        process7 file8 36 /var/spool/cron/crontabs/tmp.9UyNTK, ASCII 19->36 dropped 50 Sample tries to persist itself using cron 19->50 52 Executes the "crontab" command typically for achieving persistence 19->52 29 sh crontab 23->29         started        32 amd64.elf 25->32         started        signatures9 process10 signatures11 54 Executes the "crontab" command typically for achieving persistence 29->54 34 amd64.elf 32->34         started        process12
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-06-28 05:11:32 UTC
File Type:
ELF64 Little (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
antivm defense_evasion discovery execution linux persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Enumerates running processes
Reads MAC address of network interface
Reads hardware information
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:enterpriseunix2
Author:Tim Brown @timb_machine
Description:Enterprise UNIX
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf aed2c29fa30ecd330d5f050aca4a27c2d4b82f0056f1d433a194abefad5d835b

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments