YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 4d345ecc5e6050ada4f78395a2aeb68a24ef4aee4a471b464c3048da36a3ab41.
Scan Results
| SHA256 hash: | 4d345ecc5e6050ada4f78395a2aeb68a24ef4aee4a471b464c3048da36a3ab41 | |
|---|---|---|
| File size: | 91'524 bytes | |
| File download: | Original | |
| MIME type: | application/x-executable | |
| MD5 hash: | 105f2905ecc05054e5ed77257bc83f61 | |
| SHA1 hash: | 009db1b225602ec56a155d9e36782e95ccdb027d | |
| SHA3-384 hash: | c6009154ddcbdc5078effe025b091da43e2277bb329ab215a1a7be9d16eea78da0268e6e2dec3af6b9728705fcfc8b13 | |
| First seen: | 2025-12-30 21:20:03 UTC | |
| Last seen: | 2025-12-30 21:23:06 UTC | |
| Sightings: | 12 | |
| imphash : | n/a | |
| ssdeep : | 1536:3/bRXUWheYdS3OQ8QsFE3SlbBFtUBs2FCDcVBIVCCfy0K9Ket:q2eYdasFHBFosSCWu5 | |
| TLSH : | n/a | |
| telfhash : | t1bae02600fc7a8a2c58db9e749ddc07bca500621254578b10df14d6e0c83f454e319b5f | |
| gimphash : | n/a | |
| dhash icon : | n/a | |
Tasks
There are 12 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
| Task ID: | bb31b87e-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | bb44e979-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | bb0e88a0-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | bb22891d-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | a398d782-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | 4d345ecc5e6050ada4f78395a2aeb68a24ef4aee4a471b464c3048da36a3ab41.elf | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 96d7b05a-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 96e78caf-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 96fbcf5a-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 96c415f3-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
| Task ID: | 725e5524-e5c5-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | MMaaRRiiOisecTanee.arc | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | True | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | Unix.Dropper.Mirai-7136014-0 |
|---|
| Signature: | Unix.Dropper.Mirai-9977145-0 |
|---|
| Signature: | Unix.Trojan.Mirai-10036362-0 |
|---|
| Signature: | Unix.Trojan.Mirai-7135937-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9770090-0 |
|---|
| Signature: | Unix.Trojan.Mirai-9907086-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CVE_2017_17215 |
|---|---|
| Author: | NDA0E |
| Description: | Detects exploitation attempt of CVE-2017-17215 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ELF_Mirai |
|---|---|
| Author: | NDA0E |
| Description: | Detects multiple Mirai variants |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | linux_generic_ipv6_catcher |
|---|---|
| Author: | @_lubiedo |
| Description: | ELF samples using IPv6 addresses |
| TLP: | TLP:WHITE |
| Repository: | Stratosphere |
| Rule name: | Linux_Generic_Threat_da28eb8b |
|---|---|
| Author: | Elastic Security |
| TLP: | TLP:WHITE |
| Repository: | elastic |
| Rule name: | setsockopt |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for setsockopt() red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | unixredflags3 |
|---|---|
| Author: | Tim Brown @timb_machine |
| Description: | Hunts for UNIX red flags |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.