MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 afa8a32ec29a31f152ba20a30eb483520fe50f2dce6c9aa9135d88f7c9c511d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments 1

SHA256 hash: afa8a32ec29a31f152ba20a30eb483520fe50f2dce6c9aa9135d88f7c9c511d7
SHA3-384 hash: a30877a2b4be26362517cdfe7e643a06ad8b3dc417da4557dd43d4ea33c5c28f63083a643f80c708193214112dd32a85
SHA1 hash: d102a399824aecc96596f8ab584264ba675aed92
MD5 hash: 0cd3b5acfab2d6081a2cb48c4c711fd3
humanhash: batman-ack-happy-xray
File name:afa8a32ec29a31f152ba20a30eb483520fe50f2dce6c9aa9135d88f7c9c511d7
Download: download sample
File size:302'576 bytes
First seen:2023-05-14 09:27:04 UTC
Last seen:2024-05-28 09:37:20 UTC
File type: elf
MIME type:application/x-executable
ssdeep 6144:D5yJ6+erYM5N1J7d9v4QAzascPKTS50xr/9dfArs1u5:9qFa31J7dh4QAzatPsS5MrTf
TLSH T16D544B4AB6AA18FDC997C8304A2761766DB074A962127D3F3486EE306D16F301F5DF32
telfhash t1b5d0a721ff751d484ab38938888d0bb656633e07e869df180a94d3c0783ea825789d8e
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Reporter petikvx

Intelligence


File Origin
# of uploads :
3
# of downloads :
136
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bpfdoor
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
7
Number of processes launched:
2
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 865744 Sample: 2n8bqQObhC.elf Startdate: 14/05/2023 Architecture: LINUX Score: 48 17 109.202.202.202, 80 INIT7CH Switzerland 2->17 19 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->19 21 91.189.91.43, 443 CANONICAL-ASGB United Kingdom 2->21 23 Multi AV Scanner detection for submitted file 2->23 7 dash rm 2n8bqQObhC.elf 2->7         started        9 python3.8 uname 2->9         started        11 dash tr 2->11         started        13 10 other processes 2->13 signatures3 process4 process5 15 2n8bqQObhC.elf 7->15         started       
Threat name:
Linux.Trojan.BPFdoor
Status:
Malicious
First seen:
2023-02-10 14:22:24 UTC
File Type:
ELF64 Little (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
linux
Behaviour
Creates Raw socket
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
commented on 2024-03-21 11:57:43 UTC

This sample seems to be a sample of BPFdoor (tag:bpfdoor), it is partially analyzed in this blog post:
https://unfinished.bike/fun-with-the-new-bpfdoor-2023