MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e760d149e0c4060c033b26a1b797a4f85b65f65e02bd5dfe3ffa19004f753c83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: e760d149e0c4060c033b26a1b797a4f85b65f65e02bd5dfe3ffa19004f753c83
SHA3-384 hash: 839aeebec39bc67e7ebedd914a2e427097007e02eec712177c96c8ed69115114ab9f5b855bfe2a1efba062bf66224655
SHA1 hash: b5c3c08c9f40612a50533ce0c18ff75d93b7ba2b
MD5 hash: b74a442cccc4026549e32fa1e1d079cd
humanhash: delaware-seventeen-mike-happy
File name:aarch64
Download: download sample
File size:509'896 bytes
First seen:2025-06-17 04:51:46 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 6144:O/izeB+/ow3gK2lc5bvyI0vOHD6BZkDgn358cIF3RI5HkdY1FP98/8ecjfP:3BohHKTyfvOHD6ByD4WcIMkuDmEesP
TLSH T195B41228EE4E3881F3D1E378DA0A4BB1B05B7DD0C166C1B2BA41E25D95EDEDED5D0212
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creates directories
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
exploit gcc lolbin remote
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
false
Architecture:
arm
Packer:
custom
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.1:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 178.69.209.93:6881
type: 70.189.134.238:6881
type: 94.198.237.87:6881
type: 78.62.142.182:6881
type: 2.229.188.68:6881
type: 37.221.87.2:6881
type: 18.218.241.3:6881
type: 18.188.31.0:6881
type: 35.167.186.212:6881
type: 178.57.93.166:6881
type: 78.31.19.106:6881
type: 176.98.92.103:6881
type: 5.130.81.206:6881
type: 99.217.127.76:6881
type: 79.91.119.216:6881
type: 31.28.53.219:6881
type: 81.28.166.215:6881
type: 176.214.55.164:6881
type: 18.220.82.190:6881
type: 13.58.27.33:6881
type: 18.223.137.220:6881
type: 68.198.247.164:6881
type: 2.50.13.74:6881
type: 27.113.11.13:6881
type: 75.84.83.85:6881
type: 14.137.208.214:6881
type: 212.233.218.199:6881
type: 35.155.156.153:6881
type: 37.110.133.237:6881
type: 86.61.89.38:6881
type: 130.239.18.158:8515
type: 135.181.227.244:50000
type: 135.181.238.57:50000
type: 37.27.119.186:50000
type: 65.21.125.172:50000
type: 135.181.238.118:50000
type: 135.181.238.51:50000
type: 37.27.103.179:50000
type: 37.27.117.124:50000
type: 37.27.120.62:50000
type: 37.27.119.182:50000
type: 37.27.117.179:50000
type: 65.21.125.160:50000
type: 37.27.104.57:50000
type: 65.21.128.229:50000
type: 47.143.48.212:50000
type: 37.27.107.60:50000
type: 182.32.25.51:50000
type: 37.27.117.182:50000
type: 178.162.174.222:28014
type: 178.162.174.77:28014
type: 178.162.174.43:28004
type: 178.162.174.227:28004
type: 178.162.173.141:28004
type: 130.239.18.158:8524
type: 138.199.27.226:51413
type: 45.154.86.160:51413
type: 213.158.1.85:51413
type: 37.187.20.193:51413
type: 94.63.77.160:51413
type: 188.166.98.93:51413
type: 212.72.212.131:51413
type: 123.118.118.4:51413
type: 150.230.113.50:51413
type: 178.66.50.3:51413
type: 190.133.17.220:51413
type: 178.70.30.2:51413
type: 91.107.12.243:51413
type: 45.32.232.91:51413
type: 178.162.174.143:28000
type: 178.162.173.141:28000
type: 195.154.233.74:6880
type: 178.162.174.45:28015
type: 45.154.87.196:50171
type: 178.162.174.169:28003
type: 178.162.174.168:28003
type: 130.239.18.158:8500
type: 88.198.230.221:49668
type: 89.149.202.13:28035
type: 79.11.107.190:6889
type: 139.180.55.100:6889
type: 80.39.176.225:6889
type: 31.15.198.160:6889
type: 152.53.45.107:6889
type: 189.203.100.239:6889
type: 67.248.142.155:6891
type: 138.199.43.97:6891
type: 130.239.18.158:8513
type: 212.120.92.15:23261
type: 178.162.174.132:28013
type: 95.211.247.101:28013
type: 212.252.73.26:14494
type: 193.176.83.155:1647
type: 46.232.211.96:28659
type: 185.183.32.162:6893
type: 204.216.222.117:1434
type: 64.226.83.235:1434
type: 91.199.227.113:20603
type: 163.172.75.19:27335
type: 178.162.173.109:28010
type: 31.215.250.64:59142
type: 93.40.240.2:24576
type: 176.115.145.194:3083
type: 89.149.200.92:28057
type: 173.208.226.26:28740
type: 72.21.17.44:60161
type: 94.75.193.172:49494
type: 154.80.6.179:59007
type: 178.162.173.232:28011
type: 176.98.92.107:49192
type: 89.149.204.83:13979
type: 47.33.249.181:10037
type: 78.107.6.95:38759
type: 71.12.4.147:50643
type: 37.48.89.139:4545
type: 95.24.197.194:48660
type: 84.240.17.247:19979
type: 188.165.29.239:32399
type: 31.215.252.133:20651
type: 130.239.18.158:8580
type: 51.159.104.78:8040
type: 84.247.173.42:8081
type: 187.188.191.206:8081
type: 194.42.111.125:51400
type: 187.184.9.12:46495
type: 142.115.120.188:36404
type: 218.154.139.184:32793
type: 222.103.163.237:33007
type: 119.237.98.151:14138
type: 195.154.170.6:8654
type: 141.95.53.34:8650
type: 66.43.9.149:35855
type: 49.230.87.173:54825
type: 181.214.206.89:27157
type: 222.120.148.176:33113
type: 31.20.243.162:24002
type: 220.88.148.221:7655
type: 61.82.121.63:41160
type: 123.143.104.116:40794
type: 51.158.145.33:52425
type: 216.232.223.134:51765
type: 189.181.3.80:48299
type: 133.106.181.176:44026
type: 103.204.85.31:21121
type: 114.129.250.209:32821
type: 31.134.188.152:4114
type: 173.186.203.91:29869
type: 27.94.239.184:13904
type: 95.214.53.172:1688
type: 123.208.218.203:51484
type: 189.189.33.146:39995
type: 1.212.90.227:62932
type: 211.200.248.131:40280
type: 180.224.156.164:56494
type: 188.187.132.190:5093
type: 91.236.143.111:6018
type: 54.194.135.233:6892
type: 151.249.171.44:4929
type: 179.221.136.42:21044
type: 31.44.53.219:49775
type: 5.155.100.101:320
type: 91.150.223.60:15011
type: 95.25.59.0:36564
type: 178.162.173.153:28012
type: 18.196.86.103:6992
type: 35.171.49.86:6992
type: 54.77.218.23:6992
type: 45.184.253.134:15317
type: 1.23.13.80:6882
type: 54.194.124.68:6882
type: 105.154.161.195:17496
type: 81.161.220.77:60861
type: 141.95.53.34:8648
type: 59.149.103.228:18649
type: 178.129.182.54:39685
type: 95.105.127.76:26113
type: 54.39.52.64:32205
type: 72.18.80.65:56881
type: 181.24.7.50:56182
type: 5.166.4.91:23462
type: 45.87.251.173:10418
type: 178.66.128.36:22716
type: 46.232.211.148:11209
type: 185.149.91.65:51032
type: 123.254.16.37:63379
type: 58.87.27.211:27009
type: 207.38.143.16:56128
type: 186.205.25.38:8773
type: 177.64.223.68:56064
type: 113.211.210.199:18891
type: 88.200.189.231:35986
type: 220.135.105.231:47311
type: 89.77.188.131:61416
type: 185.177.126.221:6890
type: 46.232.210.111:64152
type: 178.72.79.93:44824
type: 176.37.56.78:53030
type: 152.53.45.107:7086
type: 59.188.110.231:26022
type: 157.50.54.239:44762
type: 96.42.227.90:61652
type: 5.79.98.140:55774
type: 91.211.5.135:9813
type: 174.7.34.62:33652
Status:
terminated
Behavior Graph:
%3 guuid=9df7add9-1600-0000-15ba-1a72220a0000 pid=2594 /usr/bin/sudo guuid=0e71b5db-1600-0000-15ba-1a722a0a0000 pid=2602 /tmp/sample.bin guuid=9df7add9-1600-0000-15ba-1a72220a0000 pid=2594->guuid=0e71b5db-1600-0000-15ba-1a722a0a0000 pid=2602 execve guuid=2fc96ddc-1600-0000-15ba-1a722f0a0000 pid=2607 /usr/bin/dash guuid=0e71b5db-1600-0000-15ba-1a722a0a0000 pid=2602->guuid=2fc96ddc-1600-0000-15ba-1a722f0a0000 pid=2607 clone guuid=676982dc-1600-0000-15ba-1a72300a0000 pid=2608 /usr/bin/dash guuid=0e71b5db-1600-0000-15ba-1a722a0a0000 pid=2602->guuid=676982dc-1600-0000-15ba-1a72300a0000 pid=2608 clone guuid=363097dc-1600-0000-15ba-1a72310a0000 pid=2609 /usr/bin/dash guuid=0e71b5db-1600-0000-15ba-1a722a0a0000 pid=2602->guuid=363097dc-1600-0000-15ba-1a72310a0000 pid=2609 clone guuid=5501a4dc-1600-0000-15ba-1a72320a0000 pid=2610 /usr/bin/dash guuid=0e71b5db-1600-0000-15ba-1a722a0a0000 pid=2602->guuid=5501a4dc-1600-0000-15ba-1a72320a0000 pid=2610 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw
Score:
68 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1716065 Sample: aarch64.elf Startdate: 17/06/2025 Architecture: LINUX Score: 68 42 129.227.177.23, 60020, 6881 ZNETUS Singapore 2->42 44 136.30.190.15, 43489, 6881 WEBPASSUS United States 2->44 46 101 other IPs or domains 2->46 54 Multi AV Scanner detection for submitted file 2->54 56 Connects to many ports of the same IP (likely port scanning) 2->56 10 aarch64.elf 2->10         started        12 dash rm 2->12         started        14 dash rm 2->14         started        signatures3 process4 process5 16 aarch64.elf sh 10->16         started        18 aarch64.elf 10->18         started        21 aarch64.elf sh 10->21         started        signatures6 23 sh crontab 16->23         started        27 sh 16->27         started        50 Opens /sys/class/net/* files useful for querying network interface information 18->50 52 Sample reads /proc/mounts (often used for finding a writable filesystem) 18->52 29 aarch64.elf 18->29         started        31 sh crontab 21->31         started        process7 file8 40 /var/spool/cron/crontabs/tmp.Pghvlh, ASCII 23->40 dropped 58 Sample tries to persist itself using cron 23->58 60 Executes the "crontab" command typically for achieving persistence 23->60 33 sh crontab 27->33         started        36 aarch64.elf 29->36         started        signatures9 process10 signatures11 48 Executes the "crontab" command typically for achieving persistence 33->48 38 aarch64.elf 36->38         started        process12
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-06-17 04:52:27 UTC
File Type:
ELF64 Little (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf e760d149e0c4060c033b26a1b797a4f85b65f65e02bd5dfe3ffa19004f753c83

(this sample)

  
Delivery method
Distributed via web download

Comments