MalwareBazaar Database

This page shows some basic information the YARA rule mirai_botnet_unpack including corresponding malware samples.

Database Entry


YARA Rule:mirai_botnet_unpack
Author:bozer
Description:Use to detect unpacked mirai, and there variants.
Firstseen:2023-10-02 14:43:01 UTC
Lastseen:2024-04-24 10:45:17 UTC
Sightings:2'723

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter