MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cee28e2486888ff12f461e23d5c7265cd54962473fa597539a21a3247ab1314c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 6 File information Comments

SHA256 hash: cee28e2486888ff12f461e23d5c7265cd54962473fa597539a21a3247ab1314c
SHA3-384 hash: 7776a3ed0e90aace7b78eac0c2fee7dce3f9daa091a365ddd5c1686851ff06d92cab1c1a5e2249353109536dca54563e
SHA1 hash: 9c28f3cc15a771ce8ffe49b039a9f0109af03ab9
MD5 hash: 2eca3e4298eb161edb272854dc9ad74f
humanhash: winner-eighteen-uniform-mike
File name:dockerd
Download: download sample
File size:652'040 bytes
First seen:2025-11-18 11:24:28 UTC
Last seen:Never
File type: elf
MIME type:application/x-sharedlib
ssdeep 12288:a6/UbVMz/nk+NEU13RwlPT+BMM/J8KzMiemzrpf:a6/UbV6kkEU1BaPT+BFKKzYmzrpf
TLSH T15ED48D27B260A4ACE16BC43597DF81B2DA35F46512263B2B3BD4DB313E28C619B1D713
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 afa3fc4bb4f6cdd9ba5ead4cd810586444b79f67303d099f16593952bf5ef8eb
File size (compressed) :285'544 bytes
File size (de-compressed) :652'040 bytes
Format:linux/amd64
Packed file: afa3fc4bb4f6cdd9ba5ead4cd810586444b79f67303d099f16593952bf5ef8eb

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Deleting a recently created file
Sends data to a server
Launching a process
Collects information on the CPU
Sets a written file as executable
Changes the time when the file was created, accessed, or modified
Opens a port
Receives data from a server
Creating a file
Locks files
Runs as daemon
Connection attempt
Changes access rights for a written file
Manages services
Collects information on the OS
Creating a file in the %temp% directory
Substitutes an application name
Creates or modifies files in /cron to set up autorun
Loading a system driver
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
gcc rust
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
42
Number of processes launched:
29
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Persistence
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.64.le
First seen:
2025-11-18T12:59:00Z UTC
Last seen:
2025-11-19T22:56:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=316aa966-1900-0000-b80a-d52b870b0000 pid=2951 /usr/bin/sudo guuid=67343f68-1900-0000-b80a-d52b8b0b0000 pid=2955 /tmp/sample.bin guuid=316aa966-1900-0000-b80a-d52b870b0000 pid=2951->guuid=67343f68-1900-0000-b80a-d52b8b0b0000 pid=2955 execve guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957 /tmp/dockerd net send-data write-config write-file zombie guuid=67343f68-1900-0000-b80a-d52b8b0b0000 pid=2955->guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957 clone 5ad56c95-acd0-5f58-bd4b-c54f6757cd18 223.5.5.5:80 guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->5ad56c95-acd0-5f58-bd4b-c54f6757cd18 send: 55296B a73cd8b9-1f2f-5409-b0bc-0fead243e99b 5.255.105.69:48996 guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->a73cd8b9-1f2f-5409-b0bc-0fead243e99b con guuid=3ac76a68-1900-0000-b80a-d52b8e0b0000 pid=2958 /tmp/dockerd guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=3ac76a68-1900-0000-b80a-d52b8e0b0000 pid=2958 clone guuid=a95c7c6a-1900-0000-b80a-d52b900b0000 pid=2960 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=a95c7c6a-1900-0000-b80a-d52b900b0000 pid=2960 execve guuid=bfd103e8-1900-0000-b80a-d52b950c0000 pid=3221 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=bfd103e8-1900-0000-b80a-d52b950c0000 pid=3221 execve guuid=03953da0-1a00-0000-b80a-d52bfb0d0000 pid=3579 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=03953da0-1a00-0000-b80a-d52bfb0d0000 pid=3579 execve guuid=ecf381a0-1a00-0000-b80a-d52bfc0d0000 pid=3580 /usr/bin/dash write-config guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=ecf381a0-1a00-0000-b80a-d52bfc0d0000 pid=3580 execve guuid=377bc4a0-1a00-0000-b80a-d52bfd0d0000 pid=3581 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=377bc4a0-1a00-0000-b80a-d52bfd0d0000 pid=3581 execve guuid=e4e3c6a3-1a00-0000-b80a-d52b000e0000 pid=3584 /usr/bin/dash write-file guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=e4e3c6a3-1a00-0000-b80a-d52b000e0000 pid=3584 execve guuid=65d015a4-1a00-0000-b80a-d52b020e0000 pid=3586 /usr/bin/dash write-config guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=65d015a4-1a00-0000-b80a-d52b020e0000 pid=3586 execve guuid=6cbc65a4-1a00-0000-b80a-d52b040e0000 pid=3588 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=6cbc65a4-1a00-0000-b80a-d52b040e0000 pid=3588 execve guuid=4e6bb7a4-1a00-0000-b80a-d52b060e0000 pid=3590 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=4e6bb7a4-1a00-0000-b80a-d52b060e0000 pid=3590 execve guuid=838d03a5-1a00-0000-b80a-d52b070e0000 pid=3591 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=838d03a5-1a00-0000-b80a-d52b070e0000 pid=3591 execve guuid=13f602b0-1a00-0000-b80a-d52b220e0000 pid=3618 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=13f602b0-1a00-0000-b80a-d52b220e0000 pid=3618 execve guuid=0736e3b1-1a00-0000-b80a-d52b2a0e0000 pid=3626 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=0736e3b1-1a00-0000-b80a-d52b2a0e0000 pid=3626 execve guuid=f2fc4ab4-1a00-0000-b80a-d52b340e0000 pid=3636 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=f2fc4ab4-1a00-0000-b80a-d52b340e0000 pid=3636 execve guuid=3bf1dab4-1a00-0000-b80a-d52b380e0000 pid=3640 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=3bf1dab4-1a00-0000-b80a-d52b380e0000 pid=3640 execve guuid=f50480b5-1a00-0000-b80a-d52b3c0e0000 pid=3644 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=f50480b5-1a00-0000-b80a-d52b3c0e0000 pid=3644 execve guuid=2b0c9cb7-1a00-0000-b80a-d52b460e0000 pid=3654 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=2b0c9cb7-1a00-0000-b80a-d52b460e0000 pid=3654 execve guuid=9f6140b8-1a00-0000-b80a-d52b4c0e0000 pid=3660 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=9f6140b8-1a00-0000-b80a-d52b4c0e0000 pid=3660 execve guuid=1fb1bdb8-1a00-0000-b80a-d52b4f0e0000 pid=3663 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=1fb1bdb8-1a00-0000-b80a-d52b4f0e0000 pid=3663 execve guuid=da4265b9-1a00-0000-b80a-d52b520e0000 pid=3666 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=da4265b9-1a00-0000-b80a-d52b520e0000 pid=3666 execve guuid=6375e1b9-1a00-0000-b80a-d52b550e0000 pid=3669 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=6375e1b9-1a00-0000-b80a-d52b550e0000 pid=3669 execve guuid=696e65ba-1a00-0000-b80a-d52b590e0000 pid=3673 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=696e65ba-1a00-0000-b80a-d52b590e0000 pid=3673 execve guuid=81a295ba-1a00-0000-b80a-d52b5b0e0000 pid=3675 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=81a295ba-1a00-0000-b80a-d52b5b0e0000 pid=3675 execve guuid=7eaed7ba-1a00-0000-b80a-d52b5d0e0000 pid=3677 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=7eaed7ba-1a00-0000-b80a-d52b5d0e0000 pid=3677 execve guuid=36f10dbb-1a00-0000-b80a-d52b5e0e0000 pid=3678 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=36f10dbb-1a00-0000-b80a-d52b5e0e0000 pid=3678 execve guuid=364efec1-1a00-0000-b80a-d52b740e0000 pid=3700 /usr/bin/dash guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=364efec1-1a00-0000-b80a-d52b740e0000 pid=3700 execve guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=3703 /tmp/dockerd net send-data write-file zombie guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=2957->guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=3703 clone guuid=91a3ad6a-1900-0000-b80a-d52b920b0000 pid=2962 /usr/bin/systemctl guuid=a95c7c6a-1900-0000-b80a-d52b900b0000 pid=2960->guuid=91a3ad6a-1900-0000-b80a-d52b920b0000 pid=2962 execve guuid=d96f0b6b-1900-0000-b80a-d52b940b0000 pid=2964 /usr/bin/basename guuid=91a3ad6a-1900-0000-b80a-d52b920b0000 pid=2962->guuid=d96f0b6b-1900-0000-b80a-d52b940b0000 pid=2964 execve guuid=29565f6b-1900-0000-b80a-d52b950b0000 pid=2965 /usr/bin/basename guuid=91a3ad6a-1900-0000-b80a-d52b920b0000 pid=2962->guuid=29565f6b-1900-0000-b80a-d52b950b0000 pid=2965 execve guuid=d39bb66b-1900-0000-b80a-d52b980b0000 pid=2968 /usr/bin/dash guuid=91a3ad6a-1900-0000-b80a-d52b920b0000 pid=2962->guuid=d39bb66b-1900-0000-b80a-d52b980b0000 pid=2968 clone guuid=822ec46b-1900-0000-b80a-d52b990b0000 pid=2969 /usr/bin/systemctl guuid=d39bb66b-1900-0000-b80a-d52b980b0000 pid=2968->guuid=822ec46b-1900-0000-b80a-d52b990b0000 pid=2969 execve guuid=fe2fcd6b-1900-0000-b80a-d52b9a0b0000 pid=2970 /usr/bin/sed guuid=d39bb66b-1900-0000-b80a-d52b980b0000 pid=2968->guuid=fe2fcd6b-1900-0000-b80a-d52b9a0b0000 pid=2970 execve guuid=8ac768e8-1900-0000-b80a-d52b960c0000 pid=3222 /usr/bin/systemctl guuid=bfd103e8-1900-0000-b80a-d52b950c0000 pid=3221->guuid=8ac768e8-1900-0000-b80a-d52b960c0000 pid=3222 execve guuid=68df3eeb-1900-0000-b80a-d52b970c0000 pid=3223 /usr/lib/systemd/systemd-sysv-install guuid=8ac768e8-1900-0000-b80a-d52b960c0000 pid=3222->guuid=68df3eeb-1900-0000-b80a-d52b970c0000 pid=3223 execve guuid=67d5d2eb-1900-0000-b80a-d52b980c0000 pid=3224 /usr/bin/getopt guuid=68df3eeb-1900-0000-b80a-d52b970c0000 pid=3223->guuid=67d5d2eb-1900-0000-b80a-d52b980c0000 pid=3224 execve guuid=b40e61ec-1900-0000-b80a-d52b990c0000 pid=3225 /usr/sbin/update-rc.d guuid=68df3eeb-1900-0000-b80a-d52b970c0000 pid=3223->guuid=b40e61ec-1900-0000-b80a-d52b990c0000 pid=3225 execve guuid=f3423241-1a00-0000-b80a-d52b1a0d0000 pid=3354 /usr/sbin/update-rc.d guuid=68df3eeb-1900-0000-b80a-d52b970c0000 pid=3223->guuid=f3423241-1a00-0000-b80a-d52b1a0d0000 pid=3354 execve guuid=d7097ef1-1900-0000-b80a-d52b9e0c0000 pid=3230 /usr/bin/systemctl guuid=b40e61ec-1900-0000-b80a-d52b990c0000 pid=3225->guuid=d7097ef1-1900-0000-b80a-d52b9e0c0000 pid=3230 execve guuid=8b53b542-1a00-0000-b80a-d52b1f0d0000 pid=3359 /usr/bin/systemctl guuid=f3423241-1a00-0000-b80a-d52b1a0d0000 pid=3354->guuid=8b53b542-1a00-0000-b80a-d52b1f0d0000 pid=3359 execve guuid=03bff5a0-1a00-0000-b80a-d52bfe0d0000 pid=3582 /usr/sbin/sysctl write-file guuid=377bc4a0-1a00-0000-b80a-d52bfd0d0000 pid=3581->guuid=03bff5a0-1a00-0000-b80a-d52bfe0d0000 pid=3582 execve guuid=98ea45a5-1a00-0000-b80a-d52b090e0000 pid=3593 /usr/sbin/xtables-nft-multi guuid=838d03a5-1a00-0000-b80a-d52b070e0000 pid=3591->guuid=98ea45a5-1a00-0000-b80a-d52b090e0000 pid=3593 execve guuid=37e33db0-1a00-0000-b80a-d52b230e0000 pid=3619 /usr/sbin/xtables-nft-multi guuid=13f602b0-1a00-0000-b80a-d52b220e0000 pid=3618->guuid=37e33db0-1a00-0000-b80a-d52b230e0000 pid=3619 execve guuid=11e81ab2-1a00-0000-b80a-d52b2c0e0000 pid=3628 /usr/sbin/xtables-nft-multi guuid=0736e3b1-1a00-0000-b80a-d52b2a0e0000 pid=3626->guuid=11e81ab2-1a00-0000-b80a-d52b2c0e0000 pid=3628 execve guuid=52ef7eb4-1a00-0000-b80a-d52b360e0000 pid=3638 /usr/sbin/xtables-nft-multi guuid=f2fc4ab4-1a00-0000-b80a-d52b340e0000 pid=3636->guuid=52ef7eb4-1a00-0000-b80a-d52b360e0000 pid=3638 execve guuid=c60d1fb5-1a00-0000-b80a-d52b3a0e0000 pid=3642 /usr/sbin/xtables-nft-multi guuid=3bf1dab4-1a00-0000-b80a-d52b380e0000 pid=3640->guuid=c60d1fb5-1a00-0000-b80a-d52b3a0e0000 pid=3642 execve guuid=9df5aab5-1a00-0000-b80a-d52b3e0e0000 pid=3646 /usr/sbin/xtables-nft-multi guuid=f50480b5-1a00-0000-b80a-d52b3c0e0000 pid=3644->guuid=9df5aab5-1a00-0000-b80a-d52b3e0e0000 pid=3646 execve guuid=3c9fc8b7-1a00-0000-b80a-d52b480e0000 pid=3656 /usr/sbin/xtables-nft-multi guuid=2b0c9cb7-1a00-0000-b80a-d52b460e0000 pid=3654->guuid=3c9fc8b7-1a00-0000-b80a-d52b480e0000 pid=3656 execve guuid=6b1370b8-1a00-0000-b80a-d52b4e0e0000 pid=3662 /usr/sbin/xtables-nft-multi guuid=9f6140b8-1a00-0000-b80a-d52b4c0e0000 pid=3660->guuid=6b1370b8-1a00-0000-b80a-d52b4e0e0000 pid=3662 execve guuid=e09aeab8-1a00-0000-b80a-d52b500e0000 pid=3664 /usr/sbin/xtables-nft-multi guuid=1fb1bdb8-1a00-0000-b80a-d52b4f0e0000 pid=3663->guuid=e09aeab8-1a00-0000-b80a-d52b500e0000 pid=3664 execve guuid=984c93b9-1a00-0000-b80a-d52b530e0000 pid=3667 /usr/sbin/xtables-nft-multi guuid=da4265b9-1a00-0000-b80a-d52b520e0000 pid=3666->guuid=984c93b9-1a00-0000-b80a-d52b530e0000 pid=3667 execve guuid=85b216ba-1a00-0000-b80a-d52b570e0000 pid=3671 /usr/sbin/xtables-nft-multi guuid=6375e1b9-1a00-0000-b80a-d52b550e0000 pid=3669->guuid=85b216ba-1a00-0000-b80a-d52b570e0000 pid=3671 execve guuid=8b6140bb-1a00-0000-b80a-d52b600e0000 pid=3680 /usr/sbin/xtables-nft-multi guuid=36f10dbb-1a00-0000-b80a-d52b5e0e0000 pid=3678->guuid=8b6140bb-1a00-0000-b80a-d52b600e0000 pid=3680 execve guuid=92f726c2-1a00-0000-b80a-d52b760e0000 pid=3702 /usr/sbin/xtables-nft-multi guuid=364efec1-1a00-0000-b80a-d52b740e0000 pid=3700->guuid=92f726c2-1a00-0000-b80a-d52b760e0000 pid=3702 execve guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=3703->5ad56c95-acd0-5f58-bd4b-c54f6757cd18 send: 1024B b6afcbe0-6002-583b-bbbd-1c6d055c24c9 195.24.237.73:80 guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=3703->b6afcbe0-6002-583b-bbbd-1c6d055c24c9 send: 54B guuid=d599fbe8-1a00-0000-b80a-d52bcc0e0000 pid=3788 /tmp/dockerd guuid=cdb55e68-1900-0000-b80a-d52b8d0b0000 pid=3703->guuid=d599fbe8-1a00-0000-b80a-d52bcc0e0000 pid=3788 clone
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj
Score:
52 / 100
Signature
Executes the "iptables" command to insert, remove and/or manipulate rules
Sample tries to persist itself using cron
Sample tries to persist itself using System V runlevels
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1816013 Sample: dockerd.elf Startdate: 18/11/2025 Architecture: LINUX Score: 52 96 169.254.169.254, 80 USDOSUS Reserved 2->96 98 109.202.202.202, 80 INIT7CH Switzerland 2->98 100 4 other IPs or domains 2->100 11 dockerd.elf 2->11         started        13 dash rm 2->13         started        15 dash rm 2->15         started        17 4 other processes 2->17 process3 process4 19 dockerd.elf 11->19         started        file5 90 /etc/cron.d/systemhelper, ASCII 19->90 dropped 92 /etc/cron.d/syshelper, ASCII 19->92 dropped 94 /usr/local/bin/systemhelper, ELF 19->94 dropped 108 Sample tries to persist itself using cron 19->108 23 dockerd.elf sh 19->23         started        25 dockerd.elf sh 19->25         started        27 dockerd.elf sh 19->27         started        29 23 other processes 19->29 signatures6 process7 process8 31 sh ufw 23->31         started        33 sh ufw 25->33         started        35 sh ufw 27->35         started        37 sh systemctl 29->37         started        39 sh iptables 29->39         started        42 sh iptables 29->42         started        44 14 other processes 29->44 signatures9 46 ufw ufw-init 31->46         started        48 ufw iptables 31->48         started        50 ufw iptables 33->50         started        53 ufw iptables 33->53         started        55 ufw iptables 33->55         started        59 8 other processes 33->59 61 11 other processes 35->61 57 systemctl systemd-sysv-install 37->57         started        110 Executes the "iptables" command to insert, remove and/or manipulate rules 39->110 63 5 other processes 44->63 process10 signatures11 65 ufw-init iptables 46->65         started        68 ufw-init iptables 46->68         started        70 ufw-init iptables 46->70         started        82 160 other processes 46->82 106 Executes the "iptables" command to insert, remove and/or manipulate rules 50->106 72 systemd-sysv-install update-rc.d 57->72         started        74 systemd-sysv-install update-rc.d 57->74         started        76 systemd-sysv-install getopt 57->76         started        78 service systemctl 63->78         started        80 service sed 63->80         started        process12 signatures13 102 Executes the "iptables" command to insert, remove and/or manipulate rules 65->102 104 Sample tries to persist itself using System V runlevels 72->104 84 update-rc.d systemctl 72->84         started        86 update-rc.d systemctl 74->86         started        88 ip6tables modprobe 82->88         started        process14
Threat name:
Linux.Coinminer.XMRig
Status:
Malicious
First seen:
2025-11-18 11:25:34 UTC
File Type:
ELF64 Little (SO)
AV detection:
11 of 24 (45.83%)
Threat level:
  4/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery execution linux persistence privilege_escalation rootkit
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Changes its process name
Creates/modifies Cron job
Disables AppArmor
Disables SELinux
Enumerates running processes
Write file to user bin folder
Flushes firewall rules
Loads a kernel module
Renames itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:Detect_Golang_Binary
Author:Andrew Morrow
Description:Detects binaries compiled with Go
Rule name:enterpriseapps2
Author:Tim Brown @timb_machine
Description:Enterprise apps
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

elf cee28e2486888ff12f461e23d5c7265cd54962473fa597539a21a3247ab1314c

(this sample)

Comments