MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b4c4e5e3d334ca1dc4f64435656f0aa011c8651cd4343707d0397ee9dc6c41e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: b4c4e5e3d334ca1dc4f64435656f0aa011c8651cd4343707d0397ee9dc6c41e5
SHA3-384 hash: 121583c575d837ef3ab98ca3e73b11d0e5ede21f09d47b2e030c66a0b77f4a9b6b2b6bff70ba2c9b170b6e87036e3f6f
SHA1 hash: 6cadcdb2c2cd1425a44fe08e00c4cfcff9498ee0
MD5 hash: 813b69e1ffeb70cdd5a63a8103a896d3
humanhash: fish-twenty-kentucky-jig
File name:813b69e1ffeb70cdd5a63a8103a896d3
Download: download sample
File size:3'433'016 bytes
First seen:2025-12-10 13:49:26 UTC
Last seen:2025-12-14 12:24:55 UTC
File type: elf
MIME type:application/x-executable
ssdeep 98304:gnMcCalkiEvx5aK3+5C5rUJpQU0sdQEeiY:6Mfv5MC5rbFViY
TLSH T1DAF533641BE7495DCE1786A522EDAB21F7A133CD13FB2279CEC7C82A540274878D16CB
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter smica83
Tags:164-215-103-230 elf UPX
File size (compressed) :3'433'016 bytes
File size (de-compressed) :6'930'628 bytes
Format:linux/i386
Unpacked file: 1acc44199d82bc58fb788c4db6f1edd18744060b1e5666023c683c074fd1ebab

Intelligence


File Origin
# of uploads :
2
# of downloads :
45
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
elf.32.le
First seen:
2025-12-10T10:43:00Z UTC
Last seen:
2025-12-11T17:52:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Sample and/or dropped files likely contain functionality related to malicious behavior
Sample is packed with UPX
Sample reads /proc/mounts (often used for finding a writable filesystem)
Suricata IDS alerts for network traffic
Uses known network protocols on non-standard ports
Writes ELF files to hidden directories
Writes identical ELF files to multiple locations
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1830247 Sample: cEj3EEG5SN.elf Startdate: 10/12/2025 Architecture: LINUX Score: 76 81 164.215.103.230, 20145, 45034, 45036 AZERONLINEAZ Azerbaijan 2->81 83 www.innlive.in 2->83 85 innlive.in 217.21.91.56, 443, 47744 IPPLANET-ASIL United Kingdom 2->85 87 Suricata IDS alerts for network traffic 2->87 89 Connects to many ports of the same IP (likely port scanning) 2->89 91 Sample and/or dropped files likely contain functionality related to malicious behavior 2->91 93 2 other signatures 2->93 12 cEj3EEG5SN.elf 2->12         started        16 systemd uuidd 2->16         started        signatures3 process4 file5 77 /tmp/.local/gkt3.1, ELF 12->77 dropped 79 /tmp/.local/gkt3.sh, Bourne-Again 12->79 dropped 103 Writes ELF files to hidden directories 12->103 105 Writes identical ELF files to multiple locations 12->105 18 cEj3EEG5SN.elf gkt3.1 12->18         started        20 cEj3EEG5SN.elf xdg-open 12->20         started        22 cEj3EEG5SN.elf gkt3.sh 12->22         started        signatures6 process7 process8 24 gkt3.1 gkt3.1 18->24         started        28 xdg-open dbus-send 20->28         started        30 xdg-open exo-open 20->30         started        32 xdg-open xprop 20->32         started        40 4 other processes 20->40 34 gkt3.sh cat 22->34         started        36 gkt3.sh mkdir 22->36         started        38 gkt3.sh systemctl 22->38         started        42 2 other processes 22->42 file9 75 /root/.config/gkt3.1, ELF 24->75 dropped 97 Writes ELF files to hidden directories 24->97 99 Writes identical ELF files to multiple locations 24->99 101 Sample reads /proc/mounts (often used for finding a writable filesystem) 24->101 44 gkt3.1 sh 24->44         started        46 gkt3.1 sh 24->46         started        48 gkt3.1 sh 24->48         started        50 gkt3.1 ldconfig ldconfig.real 24->50         started        52 dbus-send dbus-launch 28->52         started        54 exo-open 30->54         started        56 exo-open dbus-launch 30->56         started        signatures10 process11 process12 58 sh uname 44->58         started        60 sh find 46->60         started        62 sh chmod 48->62         started        64 dbus-launch 52->64         started        66 exo-open sh evince 54->66         started        process13 68 dbus-launch dbus-daemon 64->68         started        71 dbus-launch 64->71         started        signatures14 95 Sample reads /proc/mounts (often used for finding a writable filesystem) 68->95 73 dbus-daemon 68->73         started        process15
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-12-10 13:50:22 UTC
File Type:
ELF32 Little (Exe)
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery linux upx
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

elf b4c4e5e3d334ca1dc4f64435656f0aa011c8651cd4343707d0397ee9dc6c41e5

(this sample)

Comments