YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 0f82f0992356818035d91ab0a99c844380b65865ec38f189f28900545e549874.

Scan Results


SHA256 hash: 0f82f0992356818035d91ab0a99c844380b65865ec38f189f28900545e549874
File size:124'096 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: f2cbddce810d6f4e00154b001e2ceec5
SHA1 hash: a0f27f362a22354e49363bbf1b51ee954b75766e
SHA3-384 hash: 7a144f020db97522a2057a442583400d1b5b70b20b1ac44aa8f27e122b5001c8d946efcbe9cb946f3ec87000e68fb040
First seen:2025-12-15 22:47:01 UTC
Last seen:2025-12-15 22:50:04 UTC
Sightings:5
imphash :n/a
ssdeep : 3072:HC2sNkrLm8JCARGaFtklmJ73X2D5HVZVn695:HCnkrLm/mRFtk0J7n2d1Z
TLSH :n/a
telfhash : t1cad02b19ff2d0d5cbfc30075467550178b06308817a21ca3a8fcd58dc353c263117a54
gimphash :n/a
dhash icon :n/a

Tasks


There are 5 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:652d3da6-da08-11f0-9df4-42010aa4000b
File name:0f82f0992356818035d91ab0a99c844380b65865ec38f189f28900545e549874
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.31069.LX.BOT.UNOFFICIAL
Signature:Sanesecurity.Malware.31075.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Gafgyt-6735924-0
Signature:Unix.Trojan.Gafgyt-9940653-0
Signature:Unix.Trojan.Mirai-10008934-0
Signature:Unix.Trojan.Mirai-7755770-0
Signature:Unix.Trojan.Mirai-9885259-0
Signature:Unix.Trojan.Mirai-9933849-0
Signature:Unix.Trojan.Mirai-9951089-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Linux_Generic_Threat_d2dca9e7
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Mal_LNX_Mirai_Botnet_ELF
Author:Phatcharadol Thangplub
Description:Use to detect Mirai botnet, and there variants.
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:401cad07-da08-11f0-9df4-42010aa4000b
File name:0f82f0992356818035d91ab0a99c844380b65865ec38f189f28900545e549874
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.31069.LX.BOT.UNOFFICIAL
Signature:Sanesecurity.Malware.31075.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Gafgyt-6735924-0
Signature:Unix.Trojan.Gafgyt-9940653-0
Signature:Unix.Trojan.Mirai-10008934-0
Signature:Unix.Trojan.Mirai-7755770-0
Signature:Unix.Trojan.Mirai-9885259-0
Signature:Unix.Trojan.Mirai-9933849-0
Signature:Unix.Trojan.Mirai-9951089-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Linux_Generic_Threat_d2dca9e7
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Mal_LNX_Mirai_Botnet_ELF
Author:Phatcharadol Thangplub
Description:Use to detect Mirai botnet, and there variants.
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:2583cb25-da08-11f0-9df4-42010aa4000b
File name:0f82f0992356818035d91ab0a99c844380b65865ec38f189f28900545e549874.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.31069.LX.BOT.UNOFFICIAL
Signature:Sanesecurity.Malware.31075.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Gafgyt-6735924-0
Signature:Unix.Trojan.Gafgyt-9940653-0
Signature:Unix.Trojan.Mirai-10008934-0
Signature:Unix.Trojan.Mirai-7755770-0
Signature:Unix.Trojan.Mirai-9885259-0
Signature:Unix.Trojan.Mirai-9933849-0
Signature:Unix.Trojan.Mirai-9951089-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Linux_Generic_Threat_d2dca9e7
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Mal_LNX_Mirai_Botnet_ELF
Author:Phatcharadol Thangplub
Description:Use to detect Mirai botnet, and there variants.
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:1c8affcc-da08-11f0-9df4-42010aa4000b
File name:0f82f0992356818035d91ab0a99c844380b65865ec38f189f28900545e549874
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.31069.LX.BOT.UNOFFICIAL
Signature:Sanesecurity.Malware.31075.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Gafgyt-6735924-0
Signature:Unix.Trojan.Gafgyt-9940653-0
Signature:Unix.Trojan.Mirai-10008934-0
Signature:Unix.Trojan.Mirai-7755770-0
Signature:Unix.Trojan.Mirai-9885259-0
Signature:Unix.Trojan.Mirai-9933849-0
Signature:Unix.Trojan.Mirai-9951089-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Linux_Generic_Threat_d2dca9e7
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Mal_LNX_Mirai_Botnet_ELF
Author:Phatcharadol Thangplub
Description:Use to detect Mirai botnet, and there variants.
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:f88f2971-da07-11f0-9df4-42010aa4000b
File name:0f82f0992356818035d91ab0a99c844380b65865ec38f189f28900545e549874
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.31069.LX.BOT.UNOFFICIAL
Signature:Sanesecurity.Malware.31075.LX.BOT.UNOFFICIAL
Signature:Unix.Trojan.Gafgyt-6735924-0
Signature:Unix.Trojan.Gafgyt-9940653-0
Signature:Unix.Trojan.Mirai-10008934-0
Signature:Unix.Trojan.Mirai-7755770-0
Signature:Unix.Trojan.Mirai-9885259-0
Signature:Unix.Trojan.Mirai-9933849-0
Signature:Unix.Trojan.Mirai-9951089-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Linux_Generic_Threat_d2dca9e7
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Mal_LNX_Mirai_Botnet_ELF
Author:Phatcharadol Thangplub
Description:Use to detect Mirai botnet, and there variants.
TLP:TLP:WHITE
Repository:YARAify
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.