NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash abee7fcd87df65f8be734a4778b8195fbce74a41eac31f76de0bcdda821b7449.

Scan Results


SHA256 hash: abee7fcd87df65f8be734a4778b8195fbce74a41eac31f76de0bcdda821b7449
File size:9'568'256 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: c37eeefe0dc47e60769a3519a4b0cdbf
SHA1 hash: c509ea1a4f8c6c797f7c974f1ed230c23009ca57
SHA3-384 hash: 41c4281bd5463dcda9dd0512bb65899b05e257c81040b6e86e488a019e00165c6ed5a12a8ce3db9be3102b629c2967c9
First seen:2024-03-22 16:45:44 UTC
Last seen:Never
Sightings:1
imphash : 69c7c7113e5c24eda281fb791c8d2026
ssdeep : 196608:Cf1ncO4U8SCYw4N9vpDLSRCOQWOcxCeccXPAZLi3m38NuPyRqhh4I+V:oWS+IRDOYWTccXP6LmNuPyqhvA
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:a07961eb-e86b-11ee-9d82-42010aa4000b
File name:400000.9044475c-3b01-46bb-89f6-96ecb53111a7.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Trojan.Revell-1
Signature:Win.Worm.Bloored-9940820-0
Signature:YARA.telnet_cgi.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:telnet_cgi
Author:Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
Description:Semi-Auto-generated - file telnet.cgi.txt
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:without_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any url
Reference:http://laboratorio.blogs.hispasec.com/
TLP:TLP:WHITE
Rule name:yara_template
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.