NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 9e0dc11b67522a7cfa02e4cccd0bb7e10eab3188043c889184a7619a4d8b67a9.

Scan Results


SHA256 hash: 9e0dc11b67522a7cfa02e4cccd0bb7e10eab3188043c889184a7619a4d8b67a9
File size:251'532 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: ff2a13d05e5e5cad8fe1026e9644ebd2
SHA1 hash: 90bb9a9b3697b751ab67a37ad706fc7f86704ff6
SHA3-384 hash: f3496d27a3cc275b05d5c3eefc7ef61d7be32b9cbebdb93534bc5b0db02f5f9bc409f2fa7496b379c466d080a2f0500e
First seen:2021-11-21 19:12:55 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep :n/a
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:082aceb4-4aff-11ec-99bf-42010aa4000b
File name:ff2a13d05e5e5cad8fe1026e9644ebd2
Task parameters:ClamAV scan:False
Unpack:False
Share file:False

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:superscan3_0
Author:Florian Roth
Description:Disclosed hacktool set (old stuff) - file superscan3.0.exe
TLP:TLP:WHITE
Repository:Neo23x0

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.