YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 4641db7fcc6016646eabbec769d67a4d52eb3c2803272045ba9aeb10d83878dc.
Scan Results
| SHA256 hash: | 4641db7fcc6016646eabbec769d67a4d52eb3c2803272045ba9aeb10d83878dc | |
|---|---|---|
| File size: | 208'116 bytes | |
| File download: | Original | |
| MIME type: | application/x-executable | |
| MD5 hash: | 073349fbecfd8384d834e2a6039f5319 | |
| SHA1 hash: | 0c5a4a7bd67a6efb7f0bc6ab27c4bd7c0899446b | |
| SHA3-384 hash: | 9ff1a95dafea6849f3506636067d50f44c6ed1dbdd8a8b6f9b3e4192920a45e9f3ccfc707f2a83022e6f0c03952469a9 | |
| First seen: | 2026-03-13 19:19:02 UTC | |
| Last seen: | 2026-03-13 19:22:02 UTC | |
| Sightings: | 5 | |
| imphash : | n/a | |
| ssdeep : | 3072:CVaQY6iDYe6g9sZW2ViQ676iw/3PJr+9e50Z8hKVxnh:CVaQYHbpac6T35+9eiISnh | |
| TLSH : | n/a | |
| telfhash : | t1d341b2180d7813e0a7255c4d09adff76d6a321ea7f162d338e61e85aeb69b834d10c0c | |
| gimphash : | n/a | |
| dhash icon : | n/a | |
Tasks
There are 5 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
| Task ID: | e9c8fbc5-1f11-11f1-b47f-42010aa4000b | |
|---|---|---|
| File name: | 4641db7fcc6016646eabbec769d67a4d52eb3c2803272045ba9aeb10d83878dc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Sanesecurity.Malware.28886.LC.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.29325.LC.Pl.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL |
|---|
| Signature: | SecuriteInfo.com.Linux.Mirai-81.UNOFFICIAL |
|---|
| Signature: | Unix.Dropper.Mirai-10007027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10009361-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011918-0 |
|---|
| Signature: | Unix.Trojan.Mirai-8041698-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9441505-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | ELF_IoT_Persistence_Hunt |
|---|---|
| Author: | 4r4 |
| Description: | Hunts for ELF files with persistence and download capabilities |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Toriilike_persist |
|---|---|
| Author: | 4r4 |
| Description: | Detects Torii IoT Botnet (stealthier Mirai alternative) |
| Reference: | Identified via researched data |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Trojan_Gafgyt_28a2fe0c |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | classified |
|---|---|
| TLP : | TLP:AMBER |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | c5fb0565-1f11-11f1-b47f-42010aa4000b | |
|---|---|---|
| File name: | 4641db7fcc6016646eabbec769d67a4d52eb3c2803272045ba9aeb10d83878dc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Sanesecurity.Malware.28886.LC.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.29325.LC.Pl.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL |
|---|
| Signature: | SecuriteInfo.com.Linux.Mirai-81.UNOFFICIAL |
|---|
| Signature: | Unix.Dropper.Mirai-10007027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10009361-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011918-0 |
|---|
| Signature: | Unix.Trojan.Mirai-8041698-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9441505-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | ELF_IoT_Persistence_Hunt |
|---|---|
| Author: | 4r4 |
| Description: | Hunts for ELF files with persistence and download capabilities |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Toriilike_persist |
|---|---|
| Author: | 4r4 |
| Description: | Detects Torii IoT Botnet (stealthier Mirai alternative) |
| Reference: | Identified via researched data |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Trojan_Gafgyt_28a2fe0c |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | classified |
|---|---|
| TLP : | TLP:AMBER |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | abdf19de-1f11-11f1-b47f-42010aa4000b | |
|---|---|---|
| File name: | 4641db7fcc6016646eabbec769d67a4d52eb3c2803272045ba9aeb10d83878dc.elf | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Sanesecurity.Malware.28886.LC.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.29325.LC.Pl.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL |
|---|
| Signature: | SecuriteInfo.com.Linux.Mirai-81.UNOFFICIAL |
|---|
| Signature: | Unix.Dropper.Mirai-10007027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10009361-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011918-0 |
|---|
| Signature: | Unix.Trojan.Mirai-8041698-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9441505-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | ELF_IoT_Persistence_Hunt |
|---|---|
| Author: | 4r4 |
| Description: | Hunts for ELF files with persistence and download capabilities |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Toriilike_persist |
|---|---|
| Author: | 4r4 |
| Description: | Detects Torii IoT Botnet (stealthier Mirai alternative) |
| Reference: | Identified via researched data |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Trojan_Gafgyt_28a2fe0c |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | classified |
|---|---|
| TLP : | TLP:AMBER |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | a1d9a552-1f11-11f1-b47f-42010aa4000b | |
|---|---|---|
| File name: | 4641db7fcc6016646eabbec769d67a4d52eb3c2803272045ba9aeb10d83878dc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Sanesecurity.Malware.28886.LC.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.29325.LC.Pl.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL |
|---|
| Signature: | SecuriteInfo.com.Linux.Mirai-81.UNOFFICIAL |
|---|
| Signature: | Unix.Dropper.Mirai-10007027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10009361-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011918-0 |
|---|
| Signature: | Unix.Trojan.Mirai-8041698-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9441505-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | ELF_IoT_Persistence_Hunt |
|---|---|
| Author: | 4r4 |
| Description: | Hunts for ELF files with persistence and download capabilities |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Toriilike_persist |
|---|---|
| Author: | 4r4 |
| Description: | Detects Torii IoT Botnet (stealthier Mirai alternative) |
| Reference: | Identified via researched data |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Trojan_Gafgyt_28a2fe0c |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | classified |
|---|---|
| TLP : | TLP:AMBER |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 7ea0ff00-1f11-11f1-b47f-42010aa4000b | |
|---|---|---|
| File name: | 4641db7fcc6016646eabbec769d67a4d52eb3c2803272045ba9aeb10d83878dc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Sanesecurity.Malware.28886.LC.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.29325.LC.Pl.UNOFFICIAL |
|---|
| Signature: | Sanesecurity.Malware.32133.LX.BOT.UNOFFICIAL |
|---|
| Signature: | SecuriteInfo.com.Linux.Mirai-81.UNOFFICIAL |
|---|
| Signature: | Unix.Dropper.Mirai-10007027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10009361-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011027-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10011918-0 |
|---|
| Signature: | Unix.Trojan.Mirai-8041698-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9441505-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | ELF_IoT_Persistence_Hunt |
|---|---|
| Author: | 4r4 |
| Description: | Hunts for ELF files with persistence and download capabilities |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Toriilike_persist |
|---|---|
| Author: | 4r4 |
| Description: | Detects Torii IoT Botnet (stealthier Mirai alternative) |
| Reference: | Identified via researched data |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Trojan_Gafgyt_28a2fe0c |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | classified |
|---|---|
| TLP : | TLP:AMBER |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.