MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c074f6413600f28f480bbde1f8b94145ad0530a4614f57c97d9b8b4ebe71e58e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: c074f6413600f28f480bbde1f8b94145ad0530a4614f57c97d9b8b4ebe71e58e
SHA3-384 hash: 3dd0eae64ce8617b11ff5dff4e608772834b6586f6bcee2136a5bbe2c8f23225f011fb5a1fe02411dfd4b3be69ba4d69
SHA1 hash: 689c1c7da2cf4e97a2ef433b515f3906f87074bf
MD5 hash: aae715af8f5799a2b898eb924a5fa9cd
humanhash: fix-harry-mirror-may
File name:i686
Download: download sample
File size:587'764 bytes
First seen:2025-07-01 16:39:54 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 12288:5D+Azf/CVCW3ISw+hRNb3W/aTyA9VV/cZWLnR98V+:5D+AznCVNIZ+vNbG/WYWrR98V
TLSH T1E2C42241EAB7C0F2F65349320103E7BF8F33C9099165D2A6D742F661EDB1B424A9E66C
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
7
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a file in the %temp% directory
Creates directories
Sends data to a server
Creating a process from a recently created file
Changes the time when the file was created, accessed, or modified
Collects information on the CPU
Locks files
Connection attempt
Changes access rights for a written file
Launching a process
Opens a port
Runs as daemon
Receives data from a server
DNS request
Creates or modifies files in /cron to set up autorun
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
exploit gcc
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
true
Architecture:
x86
Packer:
custom
Botnet:
unknown
Number of open files:
72
Number of processes launched:
10
Processes remaning?
false
Remote TCP ports scanned:
56321
Behaviour
Anti-VM
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.123:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 119.179.250.238:6881
type: 193.233.181.205:6881
type: 5.44.3.45:6881
type: 80.232.221.225:6881
type: 73.208.41.226:6881
type: 211.106.162.194:6881
type: 174.161.237.148:6881
type: 80.115.53.142:6881
type: 91.205.236.149:6881
type: 178.213.24.71:6881
type: 85.206.93.90:6881
type: 2.229.188.68:6881
type: 124.43.241.52:6881
type: 89.115.206.103:6881
type: 78.132.174.195:6881
type: 178.69.228.34:6881
type: 82.217.124.240:6881
type: 85.117.85.119:6881
type: 81.162.7.233:6881
type: 73.164.20.23:6881
type: 68.196.41.160:6881
type: 92.241.110.156:6881
type: 52.9.197.152:6881
type: 188.244.246.78:6881
type: 193.165.202.114:6881
type: 54.70.174.84:6881
type: 178.66.48.153:6881
type: 75.119.138.164:6881
type: 79.107.35.39:6881
type: 91.127.6.123:6881
type: 192.227.221.84:6881
type: 148.135.106.206:6881
type: 1.157.42.134:6881
type: 5.53.20.9:6881
type: 54.194.124.68:6881
type: 212.142.77.107:6881
type: 68.185.140.151:6881
type: 218.253.31.73:6881
type: 176.106.69.204:6881
type: 221.127.175.188:6881
type: 222.105.204.249:6881
type: 2.136.8.232:6881
type: 188.246.185.42:6881
type: 135.181.238.57:50000
type: 65.21.129.60:50000
type: 65.108.102.46:50000
type: 37.27.117.58:50000
type: 37.27.117.246:50000
type: 37.27.117.182:50000
type: 65.21.128.232:50000
type: 65.21.128.209:50000
type: 135.181.227.244:50000
type: 37.27.103.242:50000
type: 37.27.120.61:50000
type: 65.21.128.233:50000
type: 65.21.128.216:50000
type: 37.27.117.251:50000
type: 135.181.227.243:50000
type: 37.27.103.253:50000
type: 65.21.128.241:50000
type: 135.181.238.118:50000
type: 37.27.117.49:50000
type: 37.27.104.52:50000
type: 65.21.125.180:50000
type: 37.27.117.124:50000
type: 65.21.129.54:50000
type: 65.21.129.39:50000
type: 65.21.125.160:50000
type: 37.27.119.123:50000
type: 37.27.120.56:50000
type: 65.21.125.168:50000
type: 65.109.88.197:50000
type: 65.21.128.229:50000
type: 37.27.119.116:50000
type: 37.27.119.185:50000
type: 37.27.103.241:50000
type: 135.181.238.51:50000
type: 37.27.119.117:50000
type: 37.27.119.252:50000
type: 37.27.117.175:50000
type: 135.181.116.147:50000
type: 178.162.174.43:28004
type: 178.162.174.227:28004
type: 178.162.173.171:28004
type: 178.162.174.149:28001
type: 178.162.173.199:28001
type: 130.239.18.158:8524
type: 112.82.166.50:6882
type: 185.183.35.248:6882
type: 46.180.28.149:6882
type: 178.167.44.141:6882
type: 188.165.201.120:6882
type: 178.162.174.173:28016
type: 79.106.231.163:1434
type: 37.187.20.193:51413
type: 78.107.250.95:51413
type: 221.219.103.147:51413
type: 212.132.77.213:51413
type: 139.162.1.38:51413
type: 37.48.85.45:51413
type: 95.211.242.101:51413
type: 43.154.220.168:51413
type: 188.90.169.20:51413
type: 178.70.30.2:51413
type: 138.199.27.226:51413
type: 45.132.114.236:51413
type: 131.106.119.121:51413
type: 70.50.45.25:51413
type: 84.213.206.215:51413
type: 89.149.203.106:51413
type: 84.137.209.113:51413
type: 45.10.20.110:51413
type: 172.111.38.128:26039
type: 178.162.173.105:28003
type: 178.162.174.136:28003
type: 95.211.247.101:28003
type: 93.165.252.80:11887
type: 83.249.174.216:51415
type: 69.50.95.40:10026
type: 18.213.98.90:6880
type: 3.141.159.213:6880
type: 3.12.65.135:6880
type: 148.153.170.2:6880
type: 45.203.206.36:6880
type: 62.210.205.201:8999
type: 84.54.72.43:42226
type: 81.171.0.47:51628
type: 147.135.4.9:6884
type: 89.143.164.77:16514
type: 83.149.73.134:51934
type: 185.162.184.3:52600
type: 62.112.10.81:6887
type: 54.36.106.232:47597
type: 51.15.12.28:59744
type: 89.149.202.3:28051
type: 46.232.211.157:64236
type: 210.17.254.239:25801
type: 162.251.63.120:10038
type: 185.157.221.247:25401
type: 104.248.81.201:6983
type: 69.50.95.40:10055
type: 119.81.201.134:23031
type: 69.50.95.40:10093
type: 216.172.124.162:11561
type: 45.87.251.11:28127
type: 217.121.231.94:59625
type: 130.239.18.158:8508
type: 130.239.18.158:8521
type: 182.168.134.76:13447
type: 126.147.250.140:22784
type: 94.6.141.71:10386
type: 220.97.138.51:13665
type: 46.232.211.79:14309
type: 142.202.48.88:10099
type: 72.21.17.71:29583
type: 61.58.217.70:14617
type: 83.149.84.32:28046
type: 175.110.115.46:6888
type: 94.75.194.218:28009
type: 178.162.173.172:28009
type: 122.213.58.16:27014
type: 95.94.225.156:61619
type: 46.232.211.148:11209
type: 81.171.20.66:64010
type: 183.97.84.214:65339
type: 54.211.14.111:20871
type: 185.149.91.171:51010
type: 178.162.174.222:28014
type: 130.239.18.158:8515
type: 181.41.202.186:23082
type: 220.123.165.122:20822
type: 140.130.47.6:6889
type: 185.145.24.204:6889
type: 87.197.140.20:6889
type: 62.166.235.137:6889
type: 84.28.15.171:6889
type: 108.172.32.156:6889
type: 185.149.91.23:51017
type: 2.62.169.224:27649
type: 173.183.34.178:25812
type: 121.181.18.107:33176
type: 46.53.173.137:8698
type: 188.93.140.225:63219
type: 80.237.17.186:34616
type: 178.141.213.130:20581
type: 188.186.69.104:31858
type: 121.173.130.33:60762
type: 2.60.15.245:41610
type: 46.246.5.37:65535
type: 68.1.178.137:41165
type: 46.232.211.15:15309
type: 61.92.11.138:7890
type: 42.191.64.31:11830
type: 95.123.30.240:19566
type: 75.139.209.112:17422
type: 2.63.180.143:59612
type: 167.248.25.121:10541
type: 5.18.244.151:10742
type: 72.21.17.50:27612
type: 93.47.32.111:16897
type: 220.87.35.154:1825
type: 89.65.9.224:29317
type: 32.223.189.96:38518
type: 118.34.106.96:58253
type: 195.154.185.217:22905
type: 94.140.152.97:30204
type: 86.149.233.134:50321
type: 86.19.242.244:50321
type: 191.186.228.98:50321
type: 20.193.239.114:34487
type: 86.22.172.3:15441
type: 188.113.233.87:34521
type: 78.196.230.79:41524
type: 46.246.106.38:27492
type: 176.195.229.62:12206
type: 78.85.227.233:42444
type: 188.18.249.165:2312
type: 126.77.28.41:43445
type: 136.243.179.30:39413
type: 177.104.100.214:54786
type: 188.165.242.169:50320
type: 152.53.104.128:10240
type: 195.170.172.38:10240
type: 152.53.52.107:10240
type: 146.59.3.81:10240
type: 194.29.101.83:10240
type: 186.18.42.169:19024
type: 152.53.45.107:7137
type: 213.24.125.34:4875
type: 59.6.141.87:14939
type: 118.40.78.148:42675
type: 95.25.235.136:7253
type: 189.72.60.161:46775
type: 175.209.219.15:40757
type: 79.86.201.145:63453
type: 92.255.201.35:64237
type: 178.71.42.56:49001
type: 212.194.17.73:49001
type: 31.181.133.167:49001
type: 207.96.127.207:49001
type: 54.39.52.64:48853
type: 5.135.138.216:63987
type: 190.185.141.23:21460
type: 181.188.162.181:30139
type: 78.191.152.204:52804
type: 152.53.45.107:6892
type: 185.181.39.43:35691
type: 54.39.52.64:13832
type: 92.55.191.129:9061
type: 95.214.53.172:1688
type: 145.255.179.211:16141
type: 89.149.200.92:28054
type: 172.111.38.128:22021
type: 46.232.211.193:64038
type: 89.149.202.152:15154
type: 193.203.15.77:47501
type: 94.23.201.153:53641
type: 78.81.151.220:14557
type: 119.206.67.108:40935
type: 121.131.113.49:21838
type: 31.200.238.206:4355
type: 188.32.123.101:22577
type: 78.62.7.90:36501
type: 144.76.175.153:28019
type: 88.222.34.165:57642
type: 188.233.4.43:23715
type: 146.120.3.190:51581
type: 212.7.202.213:19793
type: 92.55.191.129:11777
type: 14.47.102.224:8145
type: 54.39.52.64:64804
type: 94.181.167.47:37789
type: 188.163.103.221:59427
type: 59.84.241.13:8833
type: 90.113.161.133:43666
type: 46.232.210.50:16409
type: 31.130.7.126:10340
type: 185.21.217.61:52314
type: 165.73.62.161:20770
type: 72.21.17.54:57987
type: 14.39.184.83:32997
type: 46.232.210.72:64157
type: 86.10.154.164:57748
type: 86.218.5.54:15372
type: 141.95.53.34:8650
type: 195.3.224.136:51462
type: 14.199.108.103:17918
type: 93.56.171.106:42409
Status:
terminated
Behavior Graph:
%3 guuid=ac1d3767-1800-0000-6d52-f21986060000 pid=1670 /usr/bin/sudo guuid=181a8369-1800-0000-6d52-f2198e060000 pid=1678 /root/.sys/configuration guuid=ac1d3767-1800-0000-6d52-f21986060000 pid=1670->guuid=181a8369-1800-0000-6d52-f2198e060000 pid=1678 execve guuid=f332e369-1800-0000-6d52-f2198f060000 pid=1679 /usr/bin/dash guuid=181a8369-1800-0000-6d52-f2198e060000 pid=1678->guuid=f332e369-1800-0000-6d52-f2198f060000 pid=1679 execve guuid=c86b186a-1800-0000-6d52-f21991060000 pid=1681 /usr/bin/dash guuid=181a8369-1800-0000-6d52-f2198e060000 pid=1678->guuid=c86b186a-1800-0000-6d52-f21991060000 pid=1681 execve guuid=e32e776a-1800-0000-6d52-f21994060000 pid=1684 /root/.sys/configuration zombie guuid=181a8369-1800-0000-6d52-f2198e060000 pid=1678->guuid=e32e776a-1800-0000-6d52-f21994060000 pid=1684 clone guuid=2364456a-1800-0000-6d52-f21992060000 pid=1682 /usr/bin/dash guuid=c86b186a-1800-0000-6d52-f21991060000 pid=1681->guuid=2364456a-1800-0000-6d52-f21992060000 pid=1682 clone guuid=7dce496a-1800-0000-6d52-f21993060000 pid=1683 /usr/bin/dash guuid=c86b186a-1800-0000-6d52-f21991060000 pid=1681->guuid=7dce496a-1800-0000-6d52-f21993060000 pid=1683 clone guuid=c73eb871-1800-0000-6d52-f219ab060000 pid=1707 /root/.sys/configuration guuid=e32e776a-1800-0000-6d52-f21994060000 pid=1684->guuid=c73eb871-1800-0000-6d52-f219ab060000 pid=1707 clone guuid=890dd071-1800-0000-6d52-f219ac060000 pid=1708 /root/.sys/configuration guuid=c73eb871-1800-0000-6d52-f219ab060000 pid=1707->guuid=890dd071-1800-0000-6d52-f219ac060000 pid=1708 clone guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709 /root/.sys/configuration dns net net-scan send-data guuid=890dd071-1800-0000-6d52-f219ac060000 pid=1708->guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709 clone d316b2ae-0a7e-5b43-8de6-745900c90c54 127.0.0.1:65535 guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709->d316b2ae-0a7e-5b43-8de6-745900c90c54 con 38a4910e-6f05-5afe-a8e3-398c2eb18329 time.cloudflare.com:123 guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709->38a4910e-6f05-5afe-a8e3-398c2eb18329 send: 48B 50314045-fe84-57bd-8ca6-ca6477560f06 31.200.249.227:31775 guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709->50314045-fe84-57bd-8ca6-ca6477560f06 send: 68B guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709|send-data send-data to 255 IP addresses review logs to see them all guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709->guuid=3dc2df71-1800-0000-6d52-f219ad060000 pid=1709|send-data send
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.spyw
Score:
68 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample scans a subnet
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1726542 Sample: i686.elf Startdate: 01/07/2025 Architecture: LINUX Score: 68 38 178.162.174.184, 28015, 6881 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 2->38 40 2.204.95.49, 42829 VODANETInternationalIP-BackboneofVodafoneDE Germany 2->40 42 102 other IPs or domains 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Sample scans a subnet 2->46 10 i686.elf configuration 2->10         started        signatures3 process4 process5 12 i686.elf sh 10->12         started        14 configuration 10->14         started        17 i686.elf sh 10->17         started        signatures6 19 sh crontab 12->19         started        23 sh 12->23         started        54 Opens /sys/class/net/* files useful for querying network interface information 14->54 56 Sample reads /proc/mounts (often used for finding a writable filesystem) 14->56 25 configuration 14->25         started        27 sh crontab 17->27         started        process7 file8 36 /var/spool/cron/crontabs/tmp.aKN1e1, ASCII 19->36 dropped 48 Sample tries to persist itself using cron 19->48 50 Executes the "crontab" command typically for achieving persistence 19->50 29 sh crontab 23->29         started        32 configuration 25->32         started        signatures9 process10 signatures11 52 Executes the "crontab" command typically for achieving persistence 29->52 34 configuration 32->34         started        process12
Threat name:
Linux.Trojan.Multiverze
Status:
Malicious
First seen:
2025-07-01 16:40:30 UTC
File Type:
ELF32 Little (Exe)
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
antivm defense_evasion discovery execution linux persistence privilege_escalation
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Checks hardware identifiers (DMI)
Creates/modifies Cron job
Enumerates running processes
Reads MAC address of network interface
Reads hardware information
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf c074f6413600f28f480bbde1f8b94145ad0530a4614f57c97d9b8b4ebe71e58e

(this sample)

  
Delivery method
Distributed via web download

Comments