NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 994cabbda8f6890b1bab20d585e1dcf92e7d410ec7c426c75494172c42a8069e.

Scan Results


SHA256 hash: 994cabbda8f6890b1bab20d585e1dcf92e7d410ec7c426c75494172c42a8069e
File size:11'467'867 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 499c9c7e7f03a68cea217921ac118ee8
SHA1 hash: 24db623bf410d1538dcaa476ec6f91652e44f81c
SHA3-384 hash: 0326dad99df88630ef7cf87452a43556f6fc020054c2f339722bd423b0663abf127f7f0f9a1642b06c82104cc4ed1d64
First seen:2024-09-13 01:19:19 UTC
Last seen:Never
Sightings:1
imphash : c1f9ea6d51ba4934aeaee8b1f7d283d7
ssdeep : 196608:806/u+ZElnV5nsJ6Fowcy/n9xqyT7CKorQH+sj0Ipe7Pp/Xy+2uXgvjsJ:DAu/sJa/DqyTLC6+sLpAp/R2CgvjsJ
TLSH : T1B9C6331E19A6DEB6EDC2423F44AA76DD76E33110D7CAAC19A226DCECA3FC1051445F2C
telfhash :n/a
gimphash :n/a
File icon (PE):PE icon
dhash icon : e0c8cec6c6c6c8e0

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:33b161ff-716e-11ef-b6ec-42010aa4000b
File name:499c9c7e7f03a68cea217921ac118ee8
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.AsylumMusicFile-1
Signature:PUA.Win.Tool.Kmsauto-7340666-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Detect_Malicious_VBScript_Base64
Author:daniyyell
Description:Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
TLP:TLP:WHITE
Repository:YARAify
Rule name:Detect_Malicious_VBScript_Base64
Author:daniyyell
Description:Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.