YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash b4f4377c6201207caeaf90b12a1cf423fe5f5d5d7051d06ebffeee456aee6e24
.
Scan Results
SHA256 hash: | b4f4377c6201207caeaf90b12a1cf423fe5f5d5d7051d06ebffeee456aee6e24 | |
---|---|---|
File size: | 1'216'166 bytes | |
File download: | Original | |
MIME type: | application/x-dosexec | |
MD5 hash: | 3c148506ace07563d08dee62515ac6a3 | |
SHA1 hash: | 8de0723f0b54d8df53870a144a6bbb9daa95d7d1 | |
SHA3-384 hash: | 22734790397134733ef6c749d451abf2d053febb786679fa5117203afe25ec3f26037f8bd47e3ec542e448a1f269cc98 | |
First seen: | 2025-08-24 22:14:46 UTC | |
Last seen: | Never | |
Sightings: | 1 | |
imphash : | ace98bc30225bad48965ac27e4e0a62f | |
ssdeep : | 12288:Qk6zptH3x1RflYlTlE4kzvOWGKOjr1OCg/sNrmPFOux+YfGfeN4ZUPw4toloS:Qk6Np3x/9yVkrOWGpjWEIXbufURo | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | b0f0f0f0cccccccc |
Tasks
There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | be4f1f22-8137-11f0-8fb7-42010aa4000b | |
---|---|---|
File name: | 400000.637bd3bf-10d5-48e9-8f49-3ddce5360827.exe | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | Borland |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | Check_OutputDebugStringA_iat |
---|---|
TLP: | TLP:WHITE |
Repository: |
Rule name: | CP_AllMal_Detector |
---|---|
Author: | DiegoAnalytics |
Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | DebuggerException__SetConsoleCtrl |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | Disable_Defender |
---|---|
Author: | iam-py-test |
Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Rule name: | FreddyBearDropper |
---|---|
Author: | Dwarozh Hoshiar |
Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | pe_detect_tls_callbacks |
---|---|
Author: | |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
---|---|
Author: | XiAnzheng |
Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | upx_largefile |
---|---|
Author: | k3nr9 |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | UPXv20MarkusLaszloReiser |
---|---|
Author: | malware-lu |
TLP: | TLP:WHITE |
Repository: |
Rule name: | classified |
---|---|
Author: | classified |
Description: | classified |
TLP : | TLP:AMBER |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter