YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 1cd4cc9db6c8b003cfeccc0d14bedc623b12ac728a5bddee2acb10f602d2a1a8.

Scan Results


SHA256 hash: 1cd4cc9db6c8b003cfeccc0d14bedc623b12ac728a5bddee2acb10f602d2a1a8
File size:41'296 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: b927c936859ee691577424e420ce14c6
SHA1 hash: 0a53bfb754df07fb24f4d10c4bad401b362255f6
SHA3-384 hash: d1b5de048e1ffd45aa2ff304d3ece0bd1410714314e2cc02d64eb71c40365d0062fd61de064ac8d8dd42c13b9fc39235
First seen:2026-05-18 07:36:03 UTC
Last seen:2026-05-18 07:39:02 UTC
Sightings:5
imphash :n/a
ssdeep : 768:g2HJeRRzOfGyM21RgGW1Gz0kclnnKwHgLf6QjX4ckLaWunbcuyD7UHQRjw:5CRzGGyDjbWP7nnKwAT6AockLjunouyq
TLSH :n/a
telfhash : tnull
gimphash :n/a
dhash icon :n/a

Tasks


There are 5 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:a3c6e4d2-528c-11f1-badc-42010aa4000b
File name:1cd4cc9db6c8b003cfeccc0d14bedc623b12ac728a5bddee2acb10f602d2a1a8
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:80ad054d-528c-11f1-badc-42010aa4000b
File name:1cd4cc9db6c8b003cfeccc0d14bedc623b12ac728a5bddee2acb10f602d2a1a8
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:6b2b17cd-528c-11f1-badc-42010aa4000b
File name:1cd4cc9db6c8b003cfeccc0d14bedc623b12ac728a5bddee2acb10f602d2a1a8.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:5d45b882-528c-11f1-badc-42010aa4000b
File name:1cd4cc9db6c8b003cfeccc0d14bedc623b12ac728a5bddee2acb10f602d2a1a8
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:39524b34-528c-11f1-badc-42010aa4000b
File name:1cd4cc9db6c8b003cfeccc0d14bedc623b12ac728a5bddee2acb10f602d2a1a8
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7135858-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.