MalwareBazaar Database

This page shows some basic information the YARA rule ELF_Toriilike_persist including corresponding malware samples.

Database Entry


YARA Rule:ELF_Toriilike_persist
Author:4r4
Description:Detects Torii IoT Botnet (stealthier Mirai alternative)
Firstseen:2025-12-25 15:41:52 UTC
Lastseen:2025-12-27 13:08:57 UTC
Sightings:296

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter