YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 95cdfa884c5a98a41937993a719d77809da4a294920049bf785f3730f5819529.

Scan Results


SHA256 hash: 95cdfa884c5a98a41937993a719d77809da4a294920049bf785f3730f5819529
File size:96'540 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: 17a9a124c74c675948fc08acc8d48754
SHA1 hash: fabbe645f751834fef3da7b07c06a13622da461b
SHA3-384 hash: 39f3d39e886f3a4b7cadf249b62e28b04b721b8a3ca206fed1d58d6364e32de1c8bcc889bd046a3163e03682266f4d30
First seen:2025-12-26 18:09:35 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 1536:yBPeipZ9ErupM96Q3eYQYaLnjZMtG2CtGVO3l3Bt0a+eA1zkK2IymQY2AUm6hh1B:EPlZ9Eq3TDCc2yZ70LT6hh1fkil
TLSH :n/a
telfhash : t1cbf0eb01fe3cc70888e34a30ecac03a58043a237a0328b15ef94cee0883f009e208d9a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:094fbc16-e286-11f0-9df4-42010aa4000b
File name:95cdfa884c5a98a41937993a719d77809da4a294920049bf785f3730f5819529.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.30435.LC.UNOFFICIAL
Signature:SecuriteInfo.com.Linux.Siggen.9999-6.UNOFFICIAL
Signature:Unix.Dropper.Mirai-10007027-0
Signature:Unix.Dropper.Mirai-7135897-0
Signature:Unix.Dropper.Mirai-7135901-0
Signature:Unix.Dropper.Mirai-7135909-0
Signature:Unix.Dropper.Mirai-7135918-0
Signature:Unix.Dropper.Mirai-7135954-0
Signature:Unix.Dropper.Mirai-7136016-0
Signature:Unix.Dropper.Mirai-7136028-0
Signature:Unix.Trojan.Mirai-10009361-0
Signature:Unix.Trojan.Mirai-7100807-0
Signature:Unix.Trojan.Mirai-7135916-0
Signature:Unix.Trojan.Mirai-8025795-0
Signature:Unix.Trojan.Mirai-9441505-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:ELF_Mirai
Author:NDA0E
Description:Detects multiple Mirai variants
TLP:TLP:WHITE
Repository:YARAify
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:classified
TLP :TLP:AMBER
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.