Authenticate for API access | If you are experiencing issues with receiving data from abuse.ch platforms via API, please ensure your requests are authenticated. ➡️ Read here for more info

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 7e14adf97b99359ab96f26a6abd88de86f17935d7a8e8dfa06e4b8c40d35e8db.

Scan Results


SHA256 hash: 7e14adf97b99359ab96f26a6abd88de86f17935d7a8e8dfa06e4b8c40d35e8db
File size:357'868 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: cc3fdfad3d7a792aa1d38dd13a0228ee
SHA1 hash: 5db16815ad8b3f8ba3a7f9b1f9175ec824f9273b
SHA3-384 hash: e6484edf2c0d25b58226af3b648c76d9ed0d26f4f64e74f113e6c3e9ec67352e724dd907ad6af6fb5b0176e94dd36b36
First seen:2025-10-14 22:25:16 UTC
Last seen:Never
Sightings:1
imphash : dae02f32a21e03ce65412f6e56942daa
ssdeep : 768:G9NYTVCGybSyEcVQeZf6a6lZ/nkDQS6Wxu2iP7Xx2++:LVCIS6Wxu
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:a8e2f85b-a94c-11f0-adeb-42010aa4000b
File name:444aa14.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:extracted_at_0x44b
Author:cb
Description:sample - file extracted_at_0x44b.exe
Reference:Internal Research
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:NETDLLMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.