YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0.

Scan Results


SHA256 hash: d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0
File size:72'332 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: e542b79b5d7bc5880aff6ab58547232a
SHA1 hash: 2e768a5eb470a124fcdcd15a9bf3543ef9388886
SHA3-384 hash: 9d6dc7d2f7203913cbed4226562254f48768b25428a35c32e00d1817292097552a50018601b2f1c920905be3305cc56d
First seen:2025-12-26 18:09:02 UTC
Last seen:2025-12-26 18:14:20 UTC
Sightings:6
imphash :n/a
ssdeep : 1536:2I8n4faSCSzlvr3VsTQF25y5Vai19hr4UX2/CHLcWOpKj8ijcAYzU:hxaSB2QFMyjdDqWOp48igAY4
TLSH :n/a
telfhash : tnull
gimphash :n/a
dhash icon :n/a

Tasks


There are 6 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:b2d7c3d4-e286-11f0-9df4-42010aa4000b
File name:d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:8406150c-e286-11f0-9df4-42010aa4000b
File name:d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:60be80f8-e286-11f0-9df4-42010aa4000b
File name:d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:3cd1f1f4-e286-11f0-9df4-42010aa4000b
File name:d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:197dbf7f-e286-11f0-9df4-42010aa4000b
File name:d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:f5a8743d-e285-11f0-9df4-42010aa4000b
File name:d940b6bfe454a230367949669441ed34b0a932b7a5a5e797316c8efe5a11b7c0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Linux.Mirai-18.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.