YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 92ad070e85950e70909d2fa40a394970fee8b64559856802742da942455a3887
.
Scan Results
SHA256 hash: | 92ad070e85950e70909d2fa40a394970fee8b64559856802742da942455a3887 | |
---|---|---|
File size: | 38'708 bytes | |
File download: | Original | |
MIME type: | application/x-dosexec | |
MD5 hash: | ef52faf7540fb4aa5a1df346a68f10b0 | |
SHA1 hash: | b3956d4b57ed05a9404c1c2d4cd59910ec69e743 | |
SHA3-384 hash: | a80ddbb89e05cf2d345ee92f10c3268b9bd6e03718c54a0c83380089fd4d0a6083cb0674a90bc7b4dfb5d5cfe1a9f2b5 | |
First seen: | 2024-08-06 17:05:51 UTC | |
Last seen: | 2024-08-06 17:05:51 UTC | |
Sightings: | 2 | |
imphash : | 3cd715357f4bb1efb511566fc983cdf4 | |
ssdeep : | 384:Bape+6e9b1wxETHftKtLlGELmI4KQfJ3Eqm4GTp4yhGdAd0g8SptA7z6n6:Ba3/B1iET/8tLlGED4/3E94w6 | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 2 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | 22c2e3c4-5416-11ef-8b8b-42010aa4000b | |
---|---|---|
File name: | 400000.TMP.exe | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | PUA.Win.Packer.Chinaprotect-1 |
---|
Signature: | PUA.Win.Packer.RLPack-1 |
---|
Signature: | PUA.Win.Packer.Rlpack-42 |
---|
Signature: | PUA.Win.Packer.Rlpack-59 |
---|
Signature: | PUA.Win.Packer.RlpackFullediti-3 |
---|
Signature: | PUA.Win.Packer.RlpackFullediti-5 |
---|
Signature: | Win.Dropper.Gh0stRAT-7414189-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | CN_Honker_Webshell |
---|---|
Author: | Florian Roth (Nextron Systems) |
Description: | Sample from CN Honker Pentest Toolset - file Webshell.exe |
Reference: | Disclosed CN Honker Pentest Toolset |
TLP: | TLP:WHITE |
Repository: | Neo23x0 |
Rule name: | CN_Honker_Webshell_RID2DFD |
---|---|
Author: | Florian Roth |
Description: | Sample from CN Honker Pentest Toolset - file Webshell.exe |
Reference: | Disclosed CN Honker Pentest Toolset |
TLP: | TLP:WHITE |
Rule name: | INDICATOR_EXE_Packed_RLPack |
---|---|
Author: | ditekSHen |
Description: | Detects executables packed with RLPACK |
TLP: | TLP:WHITE |
Repository: | diˈtekSHən |
Rule name: | maldoc_find_kernel32_base_method_1 |
---|---|
Author: | Didier Stevens (https://DidierStevens.com) |
TLP: | TLP:WHITE |
Repository: |
Rule name: | malware_PoisonIvy |
---|---|
Author: | JPCERT/CC Incident Response Group |
Description: | detect PoisonIvy in memory |
Reference: | internal research |
TLP: | TLP:WHITE |
Repository: | JPCERTCC |
Rule name: | poisonivy |
---|---|
Author: | Jean-Philippe Teissier / @Jipe_ |
Description: | Poison Ivy |
TLP: | TLP:WHITE |
Repository: |
Rule name: | PoisonIvy |
---|---|
Author: | JPCERT/CC Incident Response Group |
Description: | detect PoisonIvy in memory |
Reference: | internal research |
TLP: | TLP:WHITE |
Repository: |
Rule name: | RLPackFullEdition117Ap0x |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | RLPackFullEdition117aPLibAp0x |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | RLPackFullEditionV11Xap0x |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
Task ID: | 22b0efd1-5416-11ef-8b8b-42010aa4000b | |
---|---|---|
File name: | 400000.TMP.exe | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | PUA.Win.Packer.Chinaprotect-1 |
---|
Signature: | PUA.Win.Packer.RLPack-1 |
---|
Signature: | PUA.Win.Packer.Rlpack-42 |
---|
Signature: | PUA.Win.Packer.Rlpack-59 |
---|
Signature: | PUA.Win.Packer.RlpackFullediti-3 |
---|
Signature: | PUA.Win.Packer.RlpackFullediti-5 |
---|
Signature: | Win.Dropper.Gh0stRAT-7414189-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | CN_Honker_Webshell |
---|---|
Author: | Florian Roth (Nextron Systems) |
Description: | Sample from CN Honker Pentest Toolset - file Webshell.exe |
Reference: | Disclosed CN Honker Pentest Toolset |
TLP: | TLP:WHITE |
Repository: | Neo23x0 |
Rule name: | CN_Honker_Webshell_RID2DFD |
---|---|
Author: | Florian Roth |
Description: | Sample from CN Honker Pentest Toolset - file Webshell.exe |
Reference: | Disclosed CN Honker Pentest Toolset |
TLP: | TLP:WHITE |
Rule name: | INDICATOR_EXE_Packed_RLPack |
---|---|
Author: | ditekSHen |
Description: | Detects executables packed with RLPACK |
TLP: | TLP:WHITE |
Repository: | diˈtekSHən |
Rule name: | maldoc_find_kernel32_base_method_1 |
---|---|
Author: | Didier Stevens (https://DidierStevens.com) |
TLP: | TLP:WHITE |
Repository: |
Rule name: | malware_PoisonIvy |
---|---|
Author: | JPCERT/CC Incident Response Group |
Description: | detect PoisonIvy in memory |
Reference: | internal research |
TLP: | TLP:WHITE |
Repository: | JPCERTCC |
Rule name: | poisonivy |
---|---|
Author: | Jean-Philippe Teissier / @Jipe_ |
Description: | Poison Ivy |
TLP: | TLP:WHITE |
Repository: |
Rule name: | PoisonIvy |
---|---|
Author: | JPCERT/CC Incident Response Group |
Description: | detect PoisonIvy in memory |
Reference: | internal research |
TLP: | TLP:WHITE |
Repository: |
Rule name: | RLPackFullEdition117Ap0x |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | RLPackFullEdition117aPLibAp0x |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | RLPackFullEditionV11Xap0x |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.