Task Information
Task ID: b2cb48a6-1033-11f0-b4a6-42010aa4000b
File name: 668e01087e42f5a5caf3d68e7e3d7b89
Task parameters: ClamAV scan: True
Unpack: False
Share file: True
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: command_and_control
Alert
Author: CD_R0M_
Description: This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
TLP: TLP:WHITE
Repository: CD-R0M
Rule name: DebuggerCheck__API
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: Jaff
Alert
Author: kevoreilly
Description: Jaff Payload
TLP: TLP:WHITE
Repository: CAPE
Rule name: RIPEMD160_Constants
Alert
Author: phoul (@phoul)
Description: Look for RIPEMD-160 constants
TLP: TLP:WHITE
Repository:
Rule name: SHA1_Constants
Alert
Author: phoul (@phoul)
Description: Look for SHA1 constants
TLP: TLP:WHITE
Repository:
Rule name: Sus_Obf_Enc_Spoof_Hide_PE
Alert
Author: XiAnzheng
Description: Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
TLP: TLP:WHITE
Repository: YARAify
Rule name: vmdetect
Alert
Author: nex
Description: Possibly employs anti-virtualization techniques
TLP: TLP:WHITE
Repository:
Rule name: with_urls
Alert
Author: Antonio Sanchez <asanchez@hispasec.com>
Description: Rule to detect the presence of an or several urls
Reference: http://laboratorio.blogs.hispasec.com/
TLP: TLP:WHITE
Rule name: without_attachments
Alert
Author: Antonio Sanchez <asanchez@hispasec.com>
Description: Rule to detect the no presence of any attachment
Reference: http://laboratorio.blogs.hispasec.com/
TLP: TLP:WHITE
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter