NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 8cd97679a21fcbbe0c4e746960c65ef0076aa423b1c5665115e532221ea92cdf.

Scan Results


SHA256 hash: 8cd97679a21fcbbe0c4e746960c65ef0076aa423b1c5665115e532221ea92cdf
File size:143'360 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: b71653508482d5169038fb74f376aa56
SHA1 hash: 8b531643bac02c6004d9e75b2db21e7b13b51b4b
SHA3-384 hash: 5da882271836f5f7429b7c389403e6990cefecb829ff535a0c78498c3c43a6fce3a9bb6c9f9fe8502f52d7b4eaf5458b
First seen:2025-04-03 02:31:16 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 1536:LDfDbhERTatPLT4IwlNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwk:HiRTe4IwlAW6J6f1tqF6dngNmaZk
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 60dc862226869ce1

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:b85ace3e-1033-11f0-b4a6-42010aa4000b
File name:400000.omsecor.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Dropper.Tinba-9943147-2
Signature:Win.Trojan.Barys-7191623-0
Signature:Win.Trojan.Vundo-7170413-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:TeslaCryptPackedMalware
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.