Task Information
Task ID: ed1c0d99-1033-11f0-b4a6-42010aa4000b
File name: 257163a5e87c38d290e8f65df803faf7
Task parameters: ClamAV scan: True
Unpack: False
Share file: True
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: BLOWFISH_Constants
Alert
Author: phoul (@phoul)
Description: Look for Blowfish constants
TLP: TLP:WHITE
Repository:
Rule name: DebuggerCheck__API
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: MD5_Constants
Alert
Author: phoul (@phoul)
Description: Look for MD5 constants
TLP: TLP:WHITE
Repository:
Rule name: RIPEMD160_Constants
Alert
Author: phoul (@phoul)
Description: Look for RIPEMD-160 constants
TLP: TLP:WHITE
Repository:
Rule name: SHA1_Constants
Alert
Author: phoul (@phoul)
Description: Look for SHA1 constants
TLP: TLP:WHITE
Repository:
Rule name: SHA512_Constants
Alert
Author: phoul (@phoul)
Description: Look for SHA384/SHA512 constants
TLP: TLP:WHITE
Repository:
Rule name: classified
Author: classified
Rule name: telegram_bot_api
Alert
Author: rectifyq
Description: Detects file containing Telegram Bot API
TLP: TLP:WHITE
Repository: YARAify
Rule name: classified
Author: classified
Rule name: upxHook
Alert
Author: @r3dbU7z
Description: Detect artifacts from 'upxHook' - modification of UPX packer
Reference: https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
TLP: TLP:WHITE
Repository: MalwareBazaar
Rule name: WHIRLPOOL_Constants
Alert
Author: phoul (@phoul)
Description: Look for WhirlPool constants
TLP: TLP:WHITE
Repository:
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter