YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 9d3d47d1d0904970484d2088b717fa4aca4f6d3f4cfe106a3e128c059fe9be3f
.
Scan Results
SHA256 hash: | 9d3d47d1d0904970484d2088b717fa4aca4f6d3f4cfe106a3e128c059fe9be3f | |
---|---|---|
File size: | 3'875'341 bytes | |
File download: | Original Unpacked | |
MIME type: | application/x-dosexec | |
MD5 hash: | 75ea2c9b7ce42314a3bfd8501fc960e3 | |
SHA1 hash: | a8e6e0a6b95a1dd68cf09171358afaf9e937a0f0 | |
SHA3-384 hash: | 8422e86348051026e37563839a77811c667156e55df94877e44b32d2caf4dda0405c94065965dca82bb2c37381938b6b | |
First seen: | 2025-01-11 00:20:00 UTC | |
Last seen: | Never | |
Sightings: | 1 | |
imphash : | 52d6ceb15c9d90b8a96f0fedc5d2ac34 | |
ssdeep : | 49152:mYURJtj556wtMIGXKUcivDb4dBhf/GNxIAoe:mY+bXMXKYSBGNxEe | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | cc1a107c-cfb1-11ef-a38e-42010aa4000b | |
---|---|---|
File name: | 75ea2c9b7ce42314a3bfd8501fc960e3 | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | Win.Tool.DriverInjectDll-10006024-1 |
---|
Signature: | Win.Trojan.Barys-10018495-0 |
---|
Signature: | Win.Trojan.Sfuzuan-10018491-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | Check_OutputDebugStringA_iat |
---|---|
TLP: | TLP:WHITE |
Repository: |
Rule name: | DebuggerCheck__API |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | DebuggerCheck__QueryInfo |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | golang_bin_JCorn_CSC846 |
---|---|
Author: | Justin Cornwell |
Description: | CSC-846 Golang detection ruleset |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | HKTL_Meterpreter_inMemory |
---|---|
Author: | netbiosX, Florian Roth |
Description: | Detects Meterpreter in-memory |
Reference: | https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/ |
TLP: | TLP:WHITE |
Repository: | Neo23x0 |
Rule name: | INDICATOR_SUSPICIOUS_ReflectiveLoader |
---|---|
Author: | ditekSHen |
Description: | Detects Reflective DLL injection artifacts |
TLP: | TLP:WHITE |
Repository: | diˈtekSHən |
Rule name: | MALWARE_Win_Unknown_PackedLoader_01 |
---|---|
Author: | ditekShen |
Description: | Detects unknown loader / packer. Observed running LummaStealer |
TLP: | TLP:WHITE |
Repository: | diˈtekSHən |
Rule name: | meth_peb_parsing |
---|---|
Author: | Willi Ballenthin |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | RANSOMWARE |
---|---|
Author: | ToroGuitar |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | ReflectiveLoader |
---|---|
Author: | Florian Roth (Nextron Systems) |
Description: | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended |
Reference: | Internal Research |
TLP: | TLP:WHITE |
Repository: | Neo23x0 |
Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
---|---|
Author: | XiAnzheng |
Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | VMProtectStub |
---|---|
Author: | @bartblaze |
Description: | Identifies VMProtect packer stub. |
TLP: | TLP:WHITE |
Repository: | bartblaze |
Rule name: | Windows_Trojan_Metasploit_7bc0f998 |
---|---|
Description: | Identifies the API address lookup function leverage by metasploit shellcode |
TLP: | TLP:WHITE |
Repository: | elastic |
Rule name: | Windows_Trojan_Metasploit_7bc0f998 |
---|---|
Author: | Elastic Security |
Description: | Identifies the API address lookup function leverage by metasploit shellcode |
TLP: | TLP:WHITE |
Repository: | elastic |
Rule name: | Windows_Trojan_Metasploit_c9773203 |
---|---|
Description: | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. |
Reference: | https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm |
TLP: | TLP:WHITE |
Repository: | elastic |
Rule name: | Windows_Trojan_Metasploit_c9773203 |
---|---|
Author: | Elastic Security |
Description: | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. |
Reference: | https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm |
TLP: | TLP:WHITE |
Repository: | elastic |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.