NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 7594bf1d87d35b489545e283ef1785bb2e04637cc1ff1aca9b666dde70528e2b.

Scan Results


SHA256 hash: 7594bf1d87d35b489545e283ef1785bb2e04637cc1ff1aca9b666dde70528e2b
File size:72'344 bytes
File download: Original
MIME type:application/x-sharedlib
MD5 hash: 7869667a9713df3359301842858adcac
SHA1 hash: e85b47fdb409d4b3f7097b946205523930e0c4ab
SHA3-384 hash: 01cce9dc61f03281d61398fa797a0c1a94da7214fd8e477948bf1ef1c617627a14d4994a72d7b034395fe4b7345d301a
First seen:2024-05-20 04:24:14 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 1536:tGwB/I1r54IkCenQEXplLesRl90ZS72/Ww9a:t1/8+M6esRM872/Ww9a
TLSH :n/a
telfhash : t152e02206c63c07dc08f6ac22ca299b838193da36c479e216f795dcc9491d442fa2dc1f
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:d11c7d68-1660-11ef-9d82-42010aa4000b
File name:7594bf1d87d35b489545e283ef1785bb2e04637cc1ff1aca9b666dde70528e2b
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Trojan.Linux.Generic.266110.32527.7913.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:esxi_commands_ransomware
Author:Marius 'f0wL' Genheimer <hello@dissectingmalwa.re>
Description:Detects commands issued by Ransomware to interact with ESXi VMs
TLP:TLP:WHITE
Repository:f0wl
Rule name:gwisin_elf
Author:S2W_TALON_MUNGSUL
Description:Detection rule for gwisin ransomware elf version
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Linux_Ransomware_GwisinLocker
Author:ReversingLabs
Description:Yara rule that detects GwisinLocker ransomware.
TLP:TLP:WHITE
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
TLP:TLP:WHITE
Repository:
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.