NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 9d3d47d1d0904970484d2088b717fa4aca4f6d3f4cfe106a3e128c059fe9be3f.

Scan Results


SHA256 hash: 9d3d47d1d0904970484d2088b717fa4aca4f6d3f4cfe106a3e128c059fe9be3f
File size:3'875'341 bytes
File download: Original Unpacked
MIME type:application/x-dosexec
MD5 hash: 75ea2c9b7ce42314a3bfd8501fc960e3
SHA1 hash: a8e6e0a6b95a1dd68cf09171358afaf9e937a0f0
SHA3-384 hash: 8422e86348051026e37563839a77811c667156e55df94877e44b32d2caf4dda0405c94065965dca82bb2c37381938b6b
First seen:2025-01-11 00:20:00 UTC
Last seen:Never
Sightings:1
imphash : 52d6ceb15c9d90b8a96f0fedc5d2ac34
ssdeep : 49152:mYURJtj556wtMIGXKUcivDb4dBhf/GNxIAoe:mY+bXMXKYSBGNxEe
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:cc1a107c-cfb1-11ef-a38e-42010aa4000b
File name:75ea2c9b7ce42314a3bfd8501fc960e3
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Tool.DriverInjectDll-10006024-1
Signature:Win.Trojan.Barys-10018495-0
Signature:Win.Trojan.Sfuzuan-10018491-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Check_OutputDebugStringA_iat
TLP:TLP:WHITE
Repository:
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:Detects Reflective DLL injection artifacts
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MALWARE_Win_Unknown_PackedLoader_01
Author:ditekShen
Description:Detects unknown loader / packer. Observed running LummaStealer
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:meth_peb_parsing
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:RANSOMWARE
Author:ToroGuitar
TLP:TLP:WHITE
Repository:YARAify
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:VMProtectStub
Author:@bartblaze
Description:Identifies VMProtect packer stub.
TLP:TLP:WHITE
Repository:bartblaze
Rule name:Windows_Trojan_Metasploit_7bc0f998
Description:Identifies the API address lookup function leverage by metasploit shellcode
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_7bc0f998
Author:Elastic Security
Description:Identifies the API address lookup function leverage by metasploit shellcode
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_c9773203
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_c9773203
Author:Elastic Security
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.