Sample name: mazar
Rootkit for hacker
The application get root privileges, install tor and a proxy, then wait for remote command.