NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 7293f3ff9ba35cad67eda72dd56897a6eb432d818d8b573528f4a8cc7dd1d8c0.

Scan Results


SHA256 hash: 7293f3ff9ba35cad67eda72dd56897a6eb432d818d8b573528f4a8cc7dd1d8c0
File size:417'792 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 41c71ada16c27d295c1b7fcac36e2e02
SHA1 hash: ebdf0b2f9bfd5ef624630fe0680503c965ca231e
SHA3-384 hash: eb1df56477b505411b2e543c448d981ac9968ca81b03646ac0555e2d09f9935ec1c979da4522ceedb1be5ef4c54b9477
First seen:2024-09-06 11:25:15 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 6144:l/0uspw031xua9wXFbo+XzeCNVPMDRCsvTtvEh3AYNyceB1bDYoS:lJe9FEfXFk+D5MDRpb/eXeBl8oS
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 848c5454baf47474

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:b07fbf01-6c42-11ef-b6ec-42010aa4000b
File name:1000000.Backdoor.Win32.Poison.aec-3a150d1810543b92c5d.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.W32.Agent.CC.gen.Eldorado.18188.19205.UNOFFICIAL
Signature:SecuriteInfo.com.Win32.Agent.BB.13214.21181.UNOFFICIAL
Signature:Win.Downloader.24465-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:detect_Redline_Stealer
Author:Varp0s
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.