NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash e933269c385c9b684e2724c83e1e8ad9eacf68af0105613cd4c3fb5f1629c03c.

Scan Results


SHA256 hash: e933269c385c9b684e2724c83e1e8ad9eacf68af0105613cd4c3fb5f1629c03c
File size:159'944 bytes
File download: Original
MIME type:application/x-executable
MD5 hash: 8210e60c6c64dae3b3c4bfbff99b4cc5
SHA1 hash: 44149dce0a59c13f050dbbe8a0759149c0dc7fae
SHA3-384 hash: c2ff2fbef809351738e4400019476d4c1b02ece2d13b089604546e6c17043d54c1efa758e0ee36a57658f4ce45c961f1
First seen:2024-09-17 07:45:02 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 3072:rXSto+CzbOu4vTW7ggfTecRGM/HRGlgZwQAp9kJyejT:LSto+cvZgiTCl8wt+
TLSH :n/a
telfhash : t1c8518d712dd639e491e7f766730be9a4e871092206e271e6ef235cf3ce017480d72066
gimphash :n/a
dhash icon :n/a

Tasks


There are 2 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:9640bc46-c2f9-11ef-a38e-42010aa4000b
File name:rescan_db863
Task parameters:ClamAV scan:True
Unpack:False
Share file:False

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Sanesecurity.Malware.31075.LX.BOT.UNOFFICIAL
Signature:Unix.Dropper.Mirai-7540662-0
Signature:Unix.Trojan.Gafgyt-6735924-0
Signature:Unix.Trojan.Gafgyt-9939811-0
Signature:Unix.Trojan.Mirai-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:Linux_Trojan_Gafgyt_0cd591cd
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_33b4111a
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_620087b9
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_807911a2
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_9e9530a7
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_a33a8363
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_d0c57a2e
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_d4227dbf
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_d996d335
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Mirai_e0cf29e2
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:bf6085ce-74c8-11ef-b6ec-42010aa4000b
File name:e933269c385c9b684e2724c83e1e8ad9eacf68af0105613cd4c3fb5f1629c03c
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Unix.Dropper.Mirai-7540662-0
Signature:Unix.Trojan.Gafgyt-6735924-0
Signature:Unix.Trojan.Gafgyt-9939811-0
Signature:Unix.Trojan.Mirai-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Detect_Malicious_VBScript_Base64
Author:daniyyell
Description:Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:Linux_Trojan_Gafgyt_0cd591cd
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_33b4111a
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_620087b9
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_807911a2
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_9e9530a7
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_a33a8363
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_d0c57a2e
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_d4227dbf
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Gafgyt_d996d335
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Linux_Trojan_Mirai_e0cf29e2
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.