Evidence for benign intent:
- The majority of the binary implements well-known, benign compression and hashing functionality. Many symbols and functions align with liblzma APIs (e.g.,
lzma_index_init,lzma_index_iter_next,lzma_lzip_decoder). - Build quality and algorithmic optimizations (SHA-256, CRC SIMD) match legitimate, performance-oriented code.
Evidence for suspicion:
- The IFUNC resolver chain performs a transient GOT patch and executes a heavy initializer (
sub_421f50/sub_422a90) during IFUNC resolution. This save->patch->call->restore pattern is highly unusual and executes before typical constructors, enabling early in-process interposition. - The heavy initializer conducts program-image scanning and populates opaque function-pointer tables, which could persistently modify runtime behavior in ways that evade normal instrumentation.
Lacking evidence of network C2, credential theft, or destructive payloads, the binary cannot be definitively categorized as malicious based on the provided analysis. However, the covert, nonstandard early initializer and GOT manipulation introduce a supply-chain or in-process compromise risk. Therefore the appropriate classification is suspicious.