YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 77d5cbcf58141eb9a999279ce94fcd8420f511794fdd8f6be1db147661cb8a31
.
Scan Results
SHA256 hash: | 77d5cbcf58141eb9a999279ce94fcd8420f511794fdd8f6be1db147661cb8a31 | |
---|---|---|
File size: | 412'794 bytes | |
File download: | Original | |
MIME type: | application/x-dosexec | |
MD5 hash: | 78cf2ec239ab2f08386a819f52f724d0 | |
SHA1 hash: | 32a4e3e74f63e40af0788646f0f261217dd68f44 | |
SHA3-384 hash: | db29ac434bb2cf76dc3e50e710465c8fb6398aa7a4d53d58419331aa55dc36c6dae514164e21dc997f56d6ab98b5323e | |
First seen: | 2024-12-19 15:47:01 UTC | |
Last seen: | 2024-12-19 15:47:01 UTC | |
Sightings: | 2 | |
imphash : | a4dea81f5680b2f5e33c3b2656483a28 | |
ssdeep : | 6144:8caJu14qMyfnp7xPxJKq0q8d/OQwT8TL4CcLxYT52MZM1dh:CqrMOnpNPB0DmqM | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 2 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | 7cd4597a-be20-11ef-a38e-42010aa4000b | |
---|---|---|
File name: | 400000.432c0d64-e621-40c3-8ea0-2c48f8d8ac8e.exe | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | PUA.Win.Packer.Lccwin-2 |
---|
Signature: | Win.Malware.Picsys-6803925-0 |
---|
Signature: | Win.Worm.Picsys-9630818-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | Borland |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | DebuggerException__SetConsoleCtrl |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | golang_bin_JCorn_CSC846 |
---|---|
Author: | Justin Cornwell |
Description: | CSC-846 Golang detection ruleset |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | pe_detect_tls_callbacks |
---|---|
Author: | |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | RansomPyShield_Antiransomware |
---|---|
Author: | XiAnzheng |
Description: | Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
Task ID: | 7d25a3d3-be20-11ef-a38e-42010aa4000b | |
---|---|---|
File name: | 400000.432c0d64-e621-40c3-8ea0-2c48f8d8ac8e.exe | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | PUA.Win.Packer.Lccwin-2 |
---|
Signature: | Win.Malware.Picsys-6803925-0 |
---|
Signature: | Win.Worm.Picsys-9630818-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | Borland |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | DebuggerException__SetConsoleCtrl |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | golang_bin_JCorn_CSC846 |
---|---|
Author: | Justin Cornwell |
Description: | CSC-846 Golang detection ruleset |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | pe_detect_tls_callbacks |
---|---|
Author: | |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | RansomPyShield_Antiransomware |
---|---|
Author: | XiAnzheng |
Description: | Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.