YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0.
Scan Results
| SHA256 hash: | d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0 | |
|---|---|---|
| File size: | 72'332 bytes | |
| File download: | Original | |
| MIME type: | application/x-executable | |
| MD5 hash: | e542b79b5d7bc5880aff6ab58547232a | |
| SHA1 hash: | 2e768a5eb470a124fcdcd15a9bf3543ef9388886 | |
| SHA3-384 hash: | 9d6dc7d2f7203913cbed4226562254f48768b25428a35c32e00d1817292097552a50018601b2f1c920905be3305cc56d | |
| First seen: | 2025-12-26 18:09:02 UTC | |
| Last seen: | 2025-12-26 18:14:20 UTC | |
| Sightings: | 6 | |
| imphash : | n/a | |
| ssdeep : | 1536:2I8n4faSCSzlvr3VsTQF25y5Vai19hr4UX2/CHLcWOpKj8ijcAYzU:hxaSB2QFMyjdDqWOp48igAY4 | |
| TLSH : | n/a | |
| telfhash : | tnull | |
| gimphash : | n/a | |
| dhash icon : | n/a | |
Tasks
There are 6 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
| Task ID: | b2d7c3d4-e286-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0.elf | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | SUSP_ELF_LNX_UPX_Compressed_File |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious ELF binary with UPX compression |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | upx_packed_elf_v1 |
|---|---|
| Author: | RandomMalware |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 8406150c-e286-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0 | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | SUSP_ELF_LNX_UPX_Compressed_File |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious ELF binary with UPX compression |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | upx_packed_elf_v1 |
|---|---|
| Author: | RandomMalware |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 60be80f8-e286-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0 | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | SUSP_ELF_LNX_UPX_Compressed_File |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious ELF binary with UPX compression |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | upx_packed_elf_v1 |
|---|---|
| Author: | RandomMalware |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 3cd1f1f4-e286-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0 | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | SUSP_ELF_LNX_UPX_Compressed_File |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious ELF binary with UPX compression |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | upx_packed_elf_v1 |
|---|---|
| Author: | RandomMalware |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 197dbf7f-e286-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0 | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | SUSP_ELF_LNX_UPX_Compressed_File |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious ELF binary with UPX compression |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | upx_packed_elf_v1 |
|---|---|
| Author: | RandomMalware |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | f5a8743d-e285-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0 | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | SUSP_ELF_LNX_UPX_Compressed_File |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a suspicious ELF binary with UPX compression |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | upx_packed_elf_v1 |
|---|---|
| Author: | RandomMalware |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.