YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 4efa973d0124f943cc585ec00db2678bccfa463feb353452f85035295bce813d.

Scan Results


SHA256 hash: 4efa973d0124f943cc585ec00db2678bccfa463feb353452f85035295bce813d
File size:40'132 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: a2adcc0c250fe37e04f39b38fbd49653
SHA1 hash: fb27467feb25b3bcebcfe5f1eb55afc733c85916
SHA3-384 hash: fa7b85d2fc025cc8ee1e5fbe603e21ec03eea5d0da50e86ed3f26dab72d64d27d540d34e112aba392130e064b1aa3012
First seen:2026-05-18 07:36:03 UTC
Last seen:2026-05-18 07:39:02 UTC
Sightings:5
imphash :n/a
ssdeep : 768:Lj7Jzmzi7ygo5RGtRTd2ZrvAU0lgySOTPDRm2fvpq7N4uVcqgw09t:Um7y9rGT8T0hSaPDbq7N4u+qgw09t
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 5 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:a3f808b3-528c-11f1-badc-42010aa4000b
File name:windy.ppc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Trojan.Mirai-9936831-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:80dfa181-528c-11f1-badc-42010aa4000b
File name:windy.ppc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Trojan.Mirai-9936831-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:6e8f01f5-528c-11f1-badc-42010aa4000b
File name:4efa973d0124f943cc585ec00db2678bccfa463feb353452f85035295bce813d.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Trojan.Mirai-9936831-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:5d6e84a1-528c-11f1-badc-42010aa4000b
File name:windy.ppc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Trojan.Mirai-9936831-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:399f5cec-528c-11f1-badc-42010aa4000b
File name:windy.ppc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Trojan.Mirai-9936831-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.