MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cff6cc13d79c78fc00ee7b991014212d1835e486116189497fa6fda3cb4241ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 3 File information Comments

SHA256 hash: cff6cc13d79c78fc00ee7b991014212d1835e486116189497fa6fda3cb4241ba
SHA3-384 hash: 555c37c5532dbb57a78775cba83e3c06f45ab27c268eecb50bac7044a7cba724fa01c39b2c55265f147a1c3732f7d54a
SHA1 hash: dc94025a3d28eb3775c3761f0b6f95725f154e1f
MD5 hash: 916a10cca2de8a911b27e8c4a2bd4094
humanhash: cold-alpha-zulu-william
File name:xnxnxnxnxnxnxnxnpowerpcxnxn
Download: download sample
File size:70'852 bytes
First seen:2026-02-01 07:25:12 UTC
Last seen:2026-02-01 08:49:47 UTC
File type: elf
MIME type:application/x-executable
ssdeep 1536:Ja7MbwKNGjjH+Xq34n/q8Zu41zmX3sDgAidrPK:47Mbp2L+Xqdfoz2skdrPK
TLSH T137631256FFCC1F9CECD92BFC0BA625DB16529022A4B341E40DE58989805F9B151DA8CD
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed packed upx
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=9fdec6b8-1900-0000-ff1b-883c16090000 pid=2326 /usr/bin/sudo guuid=468fe6ba-1900-0000-ff1b-883c1c090000 pid=2332 /tmp/sample.bin guuid=9fdec6b8-1900-0000-ff1b-883c16090000 pid=2326->guuid=468fe6ba-1900-0000-ff1b-883c1c090000 pid=2332 execve
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
22 / 100
Signature
Sample is packed with UPX
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  5/10
Tags:
linux upx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf cff6cc13d79c78fc00ee7b991014212d1835e486116189497fa6fda3cb4241ba

(this sample)

  
Delivery method
Distributed via web download

Comments