YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash aa98da9d2170c1a8d4f0c01853b8f5ef365e6e6f62d21c77e53065740844ebcc
.
Scan Results
SHA256 hash: | aa98da9d2170c1a8d4f0c01853b8f5ef365e6e6f62d21c77e53065740844ebcc | |
---|---|---|
File size: | 12'747'640 bytes | |
File download: | Original Unpacked | |
MIME type: | application/x-dosexec | |
MD5 hash: | be5a313842a3f91889bcaa2b75ba5331 | |
SHA1 hash: | 222bf128f507d537d9bb561d6c56f4fb98812cdf | |
SHA3-384 hash: | 6061c4d9f346e46fb097b7aa8001daddc478a154da50296213bb6d6d9475dfddd6f991fb21b818bb9ee4d2e05edf8e16 | |
First seen: | 2024-04-28 16:25:34 UTC | |
Last seen: | Never | |
Sightings: | 1 | |
imphash : | 7da8e63a2dd9bc86f69e3483be65cc73 | |
ssdeep : | 98304:tdYOXwnS4rVR5v77GBfWx77GBfW1p1zYuraV8kf4IDQXWxad1XdhBiiMa0d1XdhD:AIcRGBfW1GBfW1pVjuQXWMikQikKY | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | f0e03ace-057b-11ef-9d82-42010aa4000b | |
---|---|---|
File name: | be5a313842a3f91889bcaa2b75ba5331 | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | PUA.Win.Packer.Aspack-29 |
---|
Signature: | PUA.Win.Packer.Aspack-30 |
---|
Signature: | PUA.Win.Packer.Asprotect-3 |
---|
Signature: | Win.Malware.Generic-6933746-0 |
---|
Signature: | Win.Ransomware.Azov-10007409-0 |
---|
Signature: | Win.Ransomware.Lazy-9979681-0 |
---|
Signature: | Win.Ransomware.Lazy-9995913-0 |
---|
Signature: | Win.Trojan.Spammy-1 |
---|
Signature: | Win.Virus.Expiro-10015624-0 |
---|
Signature: | Win.Virus.Expiro-10026968-0 |
---|
Signature: | Win.Worm.Autorun-4698 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | BitcoinAddress |
---|---|
Author: | Didier Stevens (@DidierStevens) |
Description: | Contains a valid Bitcoin address |
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Rule name: | DebuggerCheck__API |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | DebuggerCheck__QueryInfo |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | DebuggerException__SetConsoleCtrl |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | DebuggerHiding__Thread |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | MD5_Constants |
---|---|
Author: | phoul (@phoul) |
Description: | Look for MD5 constants |
TLP: | TLP:WHITE |
Repository: |
Rule name: | NET |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | NETexecutableMicrosoft |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | PE_Potentially_Signed_Digital_Certificate |
---|---|
Author: | albertzsigovits |
TLP: | TLP:WHITE |
Rule name: | RIPEMD160_Constants |
---|---|
Author: | phoul (@phoul) |
Description: | Look for RIPEMD-160 constants |
TLP: | TLP:WHITE |
Repository: |
Rule name: | SHA1_Constants |
---|---|
Author: | phoul (@phoul) |
Description: | Look for SHA1 constants |
TLP: | TLP:WHITE |
Repository: |
Rule name: | SHA512_Constants |
---|---|
Author: | phoul (@phoul) |
Description: | Look for SHA384/SHA512 constants |
TLP: | TLP:WHITE |
Repository: |
Rule name: | Uroburos |
---|---|
TLP: | TLP:WHITE |
Repository: | Intezer |
Rule name: | vmdetect |
---|---|
Author: | nex |
Description: | Possibly employs anti-virtualization techniques |
TLP: | TLP:WHITE |
Repository: |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.