NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 67299aeac6240f988430ca08cb1abc2e7e78ef0e71c32e7ed0ba30e877ff5e15.

Scan Results


SHA256 hash: 67299aeac6240f988430ca08cb1abc2e7e78ef0e71c32e7ed0ba30e877ff5e15
File size:779'240 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 936c5dda8255b473a09a6cc341542f90
SHA1 hash: 3e52aab10081372d67905b9ffbfa1afc237bfa5f
SHA3-384 hash: 56738fd6544a0b17f4dfa9ee8bd8b5ea175499180f5994179a2835d5171ad38d8e8242c37a77a2fb14c08b4e4f35dd8d
First seen:2024-10-14 10:20:58 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 12288:H+/phazjWTosQ8qu5SxbGJRtVOaf3I3h396W/naiY6+wrTFdm/GHLrD:H+/phYWT7Qmf3IRIW/nkwrT2/O
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:0158b5d9-8a16-11ef-b6ec-42010aa4000b
File name:10000000.3c0781a137d68a4fe21aae1b5f4c03b9.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Trojan.Agent-771
Signature:Win.Trojan.Packed-11
Signature:Win.Trojan.Vundo-27
Signature:Win.Trojan.Vundo-29

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Detect_Malicious_VBScript_Base64
Author:daniyyell
Description:Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
TLP:TLP:WHITE
Repository:YARAify
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.