MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2c48dcc3baafef1ce2941e46595c183617a4117101b23907abd4859bf671da0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: f2c48dcc3baafef1ce2941e46595c183617a4117101b23907abd4859bf671da0
SHA3-384 hash: 3e63f40f52b4a65ac97ec7415b4bdb318fa39321c5d52c6c39ea8c3dfbaac0158ae5e4c36fd4bb4c0a62b8fe48188ac5
SHA1 hash: 3cf6f6500bcb414a1590cf3637fe50ed8cd77cc5
MD5 hash: 7ad40f3958996b106936bfbd2170af53
humanhash: utah-virginia-william-princess
File name:aarch64
Download: download sample
File size:509'896 bytes
First seen:2025-07-12 05:04:42 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 6144:O/izeB+/ow3gK2lc5bvyI0vOHD6BZkDgn358cIF3RI5HkdY1FP98/8ecjfP:3BohHKTyfvOHD6ByD4WcIMkuDmEesP
TLSH T110B41228EE4E38D1F3D1E3B8DA0A4BB1B05B79D0C166C1B2BA41E25D95EDDDEC5D0212
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
13
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creates directories
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
false
Architecture:
arm
Packer:
custom
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
not identified
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.123:123
type: 130.239.18.158:6881
type: 67.215.246.10:6881
type: 89.179.246.14:6881
type: 84.66.244.43:6881
type: 5.79.98.134:6881
type: 45.157.233.90:6881
type: 188.191.195.78:6881
type: 84.16.48.205:6881
type: 178.118.234.179:6881
type: 91.227.242.25:6881
type: 180.147.71.143:6881
type: 123.113.191.235:6881
type: 76.143.36.115:6881
type: 14.6.227.80:6881
type: 195.91.161.83:6881
type: 218.94.219.8:6881
type: 88.20.187.127:6881
type: 222.106.137.233:6881
type: 151.84.166.229:6881
type: 213.47.162.211:6881
type: 116.46.161.213:6881
type: 62.169.27.65:6881
type: 142.171.58.199:6881
type: 23.95.32.170:6881
type: 185.191.232.242:6881
type: 18.223.137.220:6881
type: 18.218.241.3:6881
type: 35.163.251.58:6881
type: 18.191.2.28:6881
type: 119.28.68.97:6881
type: 178.168.199.99:6881
type: 18.188.31.0:6881
type: 54.214.62.55:6881
type: 58.71.192.160:6881
type: 92.124.152.42:6881
type: 54.194.124.68:6881
type: 5.79.67.16:6881
type: 35.167.186.212:6881
type: 82.200.188.34:6881
type: 192.227.221.84:6881
type: 178.162.174.222:28014
type: 130.239.18.158:8515
type: 178.162.174.43:28004
type: 130.239.18.158:8524
type: 178.162.174.149:28001
type: 54.211.14.111:20871
type: 185.203.56.68:62927
type: 85.17.31.172:28011
type: 45.132.114.236:51413
type: 71.234.185.246:51413
type: 37.187.5.145:51413
type: 80.99.210.106:51413
type: 173.206.106.211:51413
type: 178.140.186.93:51413
type: 155.248.206.239:51413
type: 86.249.185.209:51413
type: 86.120.234.243:51413
type: 79.129.138.107:51413
type: 182.87.92.155:51413
type: 79.23.37.28:51413
type: 133.123.184.221:51413
type: 95.211.247.101:28013
type: 178.162.174.208:28013
type: 146.70.204.185:43708
type: 178.162.173.36:28007
type: 65.21.141.87:27602
type: 88.198.230.221:49668
type: 178.162.174.183:28000
type: 178.162.174.9:28000
type: 172.96.121.2:6884
type: 178.162.173.36:28002
type: 95.216.110.140:32586
type: 5.79.122.78:28003
type: 83.149.98.184:28008
type: 178.162.174.232:28008
type: 52.21.231.83:6880
type: 44.210.22.159:6880
type: 34.194.153.212:6880
type: 195.154.185.217:24429
type: 185.21.216.185:60731
type: 185.203.56.40:19551
type: 174.54.35.159:49001
type: 50.70.174.34:62401
type: 187.86.66.99:35562
type: 46.232.210.221:64078
type: 89.149.200.92:28027
type: 72.21.17.92:14896
type: 103.140.3.19:10083
type: 195.154.178.158:8651
type: 212.7.202.12:55953
type: 178.33.12.50:27875
type: 178.162.173.2:28009
type: 81.171.6.43:28009
type: 178.162.174.41:28005
type: 178.222.26.52:18740
type: 119.197.199.36:32869
type: 115.65.166.64:6889
type: 61.239.218.36:6889
type: 178.162.174.73:28010
type: 114.159.205.86:25444
type: 133.32.179.184:1152
type: 5.39.85.82:53560
type: 84.29.202.152:23393
type: 51.211.213.149:21466
type: 24.130.213.236:15248
type: 213.143.86.28:60355
type: 121.140.79.41:41054
type: 177.195.103.202:60891
type: 198.135.181.157:47477
type: 82.199.215.2:18526
type: 14.32.95.243:32771
type: 178.162.174.161:28006
type: 181.117.14.178:27643
type: 80.147.15.165:17695
type: 82.67.158.74:50519
type: 88.135.26.93:49303
type: 4.23.114.176:50321
type: 104.171.93.160:50321
type: 118.33.52.103:41037
type: 72.21.17.28:29784
type: 178.162.173.91:28012
type: 178.162.174.120:28012
type: 61.92.15.70:7249
type: 73.128.101.232:52689
type: 218.250.170.94:17358
type: 210.91.146.231:8017
type: 169.150.223.237:20659
type: 197.42.219.229:38000
type: 116.62.200.65:56881
type: 72.18.80.65:56881
type: 181.118.48.51:33427
type: 71.233.133.224:6882
type: 176.157.232.26:6882
type: 45.151.107.173:54058
type: 88.236.111.95:54723
type: 179.6.34.71:30715
type: 101.235.154.133:40769
type: 188.163.42.123:36077
type: 176.63.6.86:5117
type: 146.168.194.220:38102
type: 84.66.169.248:60264
type: 107.173.149.140:6339
type: 54.194.135.233:6892
type: 54.77.218.23:6892
type: 47.89.251.173:8887
type: 141.147.157.169:10086
type: 43.134.18.13:6005
type: 208.87.240.21:11162
type: 210.211.57.119:33437
type: 186.249.131.188:28068
type: 223.231.229.2:18706
type: 54.39.52.64:54510
type: 194.29.101.83:10240
type: 38.134.41.130:32681
type: 185.183.34.96:6883
type: 87.52.106.96:54355
type: 105.216.98.167:35344
type: 221.118.242.208:24819
type: 51.159.104.67:7105
type: 95.10.206.204:64491
type: 189.148.188.90:51702
type: 46.232.210.221:64035
type: 82.67.112.130:36044
type: 122.150.228.26:27227
type: 159.255.146.216:61110
type: 24.186.90.229:46122
type: 178.162.130.161:30163
type: 72.21.17.50:10588
type: 90.146.163.9:2423
type: 185.203.56.43:10737
type: 51.183.21.132:49051
type: 77.222.159.182:42508
Status:
terminated
Behavior Graph:
%3 guuid=58100060-1900-0000-b7d9-aeb7180a0000 pid=2584 /usr/bin/sudo guuid=c321fd61-1900-0000-b7d9-aeb71e0a0000 pid=2590 /tmp/sample.bin guuid=58100060-1900-0000-b7d9-aeb7180a0000 pid=2584->guuid=c321fd61-1900-0000-b7d9-aeb71e0a0000 pid=2590 execve guuid=fbda2564-1900-0000-b7d9-aeb7240a0000 pid=2596 /usr/bin/dash guuid=c321fd61-1900-0000-b7d9-aeb71e0a0000 pid=2590->guuid=fbda2564-1900-0000-b7d9-aeb7240a0000 pid=2596 clone guuid=320d3864-1900-0000-b7d9-aeb7250a0000 pid=2597 /usr/bin/dash guuid=c321fd61-1900-0000-b7d9-aeb71e0a0000 pid=2590->guuid=320d3864-1900-0000-b7d9-aeb7250a0000 pid=2597 clone guuid=83c94b64-1900-0000-b7d9-aeb7270a0000 pid=2599 /usr/bin/dash guuid=c321fd61-1900-0000-b7d9-aeb71e0a0000 pid=2590->guuid=83c94b64-1900-0000-b7d9-aeb7270a0000 pid=2599 clone guuid=c62c6564-1900-0000-b7d9-aeb7280a0000 pid=2600 /usr/bin/dash guuid=c321fd61-1900-0000-b7d9-aeb71e0a0000 pid=2590->guuid=c62c6564-1900-0000-b7d9-aeb7280a0000 pid=2600 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.spyw
Score:
68 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample scans a subnet
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1734476 Sample: aarch64.elf Startdate: 12/07/2025 Architecture: LINUX Score: 68 38 178.162.174.11, 28007, 6881 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 2->38 40 178.162.174.165, 28007, 6881 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 2->40 42 101 other IPs or domains 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Sample scans a subnet 2->46 10 aarch64.elf 2->10         started        signatures3 process4 process5 12 aarch64.elf sh 10->12         started        14 aarch64.elf 10->14         started        17 aarch64.elf sh 10->17         started        signatures6 19 sh crontab 12->19         started        23 sh 12->23         started        54 Opens /sys/class/net/* files useful for querying network interface information 14->54 56 Sample reads /proc/mounts (often used for finding a writable filesystem) 14->56 25 aarch64.elf 14->25         started        27 sh crontab 17->27         started        process7 file8 36 /var/spool/cron/crontabs/tmp.eBsHzm, ASCII 19->36 dropped 48 Sample tries to persist itself using cron 19->48 50 Executes the "crontab" command typically for achieving persistence 19->50 29 sh crontab 23->29         started        32 aarch64.elf 25->32         started        signatures9 process10 signatures11 52 Executes the "crontab" command typically for achieving persistence 29->52 34 aarch64.elf 32->34         started        process12
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-07-12 05:05:24 UTC
File Type:
ELF64 Little (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf f2c48dcc3baafef1ce2941e46595c183617a4117101b23907abd4859bf671da0

(this sample)

  
Delivery method
Distributed via web download

Comments