YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 561d0101bc2b5579d7f3b70ac25ce83f9f849be74fe1fc0ed418fa9c1f719951.

Scan Results


SHA256 hash: 561d0101bc2b5579d7f3b70ac25ce83f9f849be74fe1fc0ed418fa9c1f719951
File size:65'228 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: 8488a998cc8a975c7ad4649e91b9a91f
SHA1 hash: 91b99f664a0e482f7b335947ca6ad3e4b5711dd0
SHA3-384 hash: f04c5e114c79c2b4377227e7d3b29f22f3c3d56a5b56f28cd4a0b568285d926ccd28753eae43b6d90c345997adc5b8a5
First seen:2025-12-26 18:11:02 UTC
Last seen:2025-12-26 18:14:20 UTC
Sightings:5
imphash :n/a
ssdeep : 1536:fDBnx5+nHi6794azk20fyWW+tZ5bQxjYenouy8Hy0:9nSHGcd05Pfk5Y+outb
TLSH :n/a
telfhash : tnull
gimphash :n/a
dhash icon :n/a

Tasks


There are 5 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:b2e2889f-e286-11f0-9df4-42010aa4000b
File name:561d0101bc2b5579d7f3b70ac25ce83f9f849be74fe1fc0ed418fa9c1f719951.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:a7e3bc72-e286-11f0-9df4-42010aa4000b
File name:561d0101bc2b5579d7f3b70ac25ce83f9f849be74fe1fc0ed418fa9c1f719951
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:84727e6d-e286-11f0-9df4-42010aa4000b
File name:561d0101bc2b5579d7f3b70ac25ce83f9f849be74fe1fc0ed418fa9c1f719951
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:60d586c6-e286-11f0-9df4-42010aa4000b
File name:561d0101bc2b5579d7f3b70ac25ce83f9f849be74fe1fc0ed418fa9c1f719951
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:3cf84511-e286-11f0-9df4-42010aa4000b
File name:561d0101bc2b5579d7f3b70ac25ce83f9f849be74fe1fc0ed418fa9c1f719951
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.