YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0.

Scan Results


SHA256 hash: f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0
File size:87'400 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: a85ace6f613a94de9f26b93820bf6c1d
SHA1 hash: a4deac4aa03d9b9ad1d5337747f25747f6343d86
SHA3-384 hash: 60a699c06f2f0aaca24951af0039b2d7fa48a4e49dac756b6a97080f13aff87ae021e8c1e9e0dd8d266ac5dab1c2a2e2
First seen:2025-12-26 20:41:03 UTC
Last seen:2025-12-26 20:45:38 UTC
Sightings:6
imphash :n/a
ssdeep : 768:9+z+7xRjxEtga0fvIO+l95VkeLQwX6t8I9Jx//Cgq1tyJBS457n1DY/ZIkACg:+sxEtF0Sl959AJx3CrtKs/ZLy
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 6 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:d5a7f7e4-e29b-11f0-9df4-42010aa4000b
File name:f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Mirai-9858729-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via researched data
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:c0aeeb97-e29b-11f0-9df4-42010aa4000b
File name:f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Mirai-9858729-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via unique string 'npxXoudifFeEgGaACScs'
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:9d538573-e29b-11f0-9df4-42010aa4000b
File name:f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Mirai-9858729-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via unique string 'npxXoudifFeEgGaACScs'
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:7a240a93-e29b-11f0-9df4-42010aa4000b
File name:f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Mirai-9858729-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via unique string 'npxXoudifFeEgGaACScs'
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:57253219-e29b-11f0-9df4-42010aa4000b
File name:f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Mirai-9858729-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via unique string 'npxXoudifFeEgGaACScs'
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:323de43d-e29b-11f0-9df4-42010aa4000b
File name:f76596dd41fba26bab3ea99d0aada03b62eaf9b33115fc714d34db002cb2c6a0
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Mirai-9858729-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Reference:Identified via unique string 'npxXoudifFeEgGaACScs'
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.