YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 593a577613d4529a1af8fc46ca7923651689b47a9c844cdcb7f000e8ce2f5988
.
Scan Results
SHA256 hash: | 593a577613d4529a1af8fc46ca7923651689b47a9c844cdcb7f000e8ce2f5988 | |
---|---|---|
File size: | 19'456 bytes | |
File download: | Original | |
MIME type: | application/x-dosexec | |
MD5 hash: | 3a9b3b90301fd8ada47e605026b83569 | |
SHA1 hash: | 477c1dbcce7cb2116729b431964d72b1298f70a6 | |
SHA3-384 hash: | 1e5770ecb90edef8292c559b9d68061a5ca5adb2d6e790d7d48644c89695780ca1b1b1cf008663227494b502681d9d3b | |
First seen: | 2025-04-03 02:32:49 UTC | |
Last seen: | Never | |
Sightings: | 1 | |
imphash : | 7bef13f58538df84f5270fe7542e9811 | |
ssdeep : | 384:PQZqSstnLmJ1d6dzkT8OwNrSfB73TtWMiS2R3Xbr17vvxlL:gqSsE1EdgT8rgDtWfSW3Lx7D | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | ef5aa2b6-1033-11f0-b4a6-42010aa4000b | |
---|---|---|
File name: | 3a9b3b90301fd8ada47e605026b83569 | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | Win.Malware.Shifu-6804440-0 |
---|
Signature: | Win.Trojan.Gamarue-9832405-0 |
---|
Signature: | Win.Trojan.Tinba-6390856-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | INDICATOR_EXE_Packed_MPress |
---|---|
Author: | ditekSHen |
Description: | Detects executables built or packed with MPress PE compressor |
TLP: | TLP:WHITE |
Repository: | diˈtekSHən |
Rule name: | mpress_2_xx_x86 |
---|---|
Author: | Kevin Falcoz |
Description: | MPRESS v2.XX x86 - no .NET |
TLP: | TLP:WHITE |
Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
---|---|
Author: | XiAnzheng |
Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | TeslaCryptPackedMalware |
---|---|
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.