Task Information
Task ID: 12453a6b-1034-11f0-b4a6-42010aa4000b
File name: 40fbeb6f3f289d3a230673579ce99074
Task parameters: ClamAV scan: True
Unpack: False
Share file: True
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: DCRat
Alert
Author: Nikolaos 'n0t' Totosis
Description: DCRat Payload
TLP: TLP:WHITE
Repository: YARAify
Rule name: DCRat
Alert
Author: ditekSHen
Description: DCRat payload
TLP: TLP:WHITE
Repository: YARAify
Rule name: Detect_PowerShell_Obfuscation
Alert
Author: daniyyell
Description: Detects obfuscated PowerShell commands commonly used in malicious scripts.
TLP: TLP:WHITE
Repository: YARAify
Rule name: Lumma_Stealer_Detection
Alert
Author: ashizZz
Description: Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference: https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
TLP: TLP:WHITE
Repository: YARAify
Rule name: Multifamily_RAT_Detection
Alert
Author: Lucas Acha (http://www.lukeacha.com)
Description: Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
TLP: TLP:WHITE
Repository:
Rule name: NET
Alert
Author: malware-lu
TLP: TLP:WHITE
Repository:
Rule name: Sus_Obf_Enc_Spoof_Hide_PE
Alert
Author: XiAnzheng
Description: Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
TLP: TLP:WHITE
Repository: YARAify
Rule name: classified
Author: classified
Description: classified
TLP : TLP:AMBER
Rule name: classified
Author: classified
Description: classified
TLP : TLP:AMBER
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter