YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc.

Scan Results


SHA256 hash: c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc
File size:163'571 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: 07a345477d9a37d03dfa006886ac7404
SHA1 hash: de92307397ad9de7224a8974a6a736b600121eae
SHA3-384 hash: 21a79c4415eafa887f304ce7cd5dad66e166480f89852092deb240d0e1f14d9132514ff2aa820e3ea615b7d239605f95
First seen:2026-05-18 07:43:03 UTC
Last seen:2026-05-18 07:47:02 UTC
Sightings:6
imphash :n/a
ssdeep : 3072:EBtr80fidEkicUJ/+/t7XZOGJ7hRDnmiALP9WS9etJtA9glei:urBRcNGGJ7hhmPP9WoetzAKl/
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 6 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:c1ed8d0f-528d-11f1-badc-42010aa4000b
File name:c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:9dffc3da-528d-11f1-badc-42010aa4000b
File name:c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:94037914-528d-11f1-badc-42010aa4000b
File name:c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc.elf
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:7abf4414-528d-11f1-badc-42010aa4000b
File name:c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:57170191-528d-11f1-badc-42010aa4000b
File name:c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:338fcd12-528d-11f1-badc-42010aa4000b
File name:c5e95fa0a3c80d759bb59f614cb7d4ffc68f65649f181f00e5b1d799adc6d6dc
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
TLP:TLP:WHITE
Repository:Stratosphere
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.