NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash b6f3873d9cf7f7faf5accb25642a46cce3c6e8f8b93d3b33f2da01e057b861a6.

Scan Results


SHA256 hash: b6f3873d9cf7f7faf5accb25642a46cce3c6e8f8b93d3b33f2da01e057b861a6
File size:680'448 bytes
File download: Original Unpacked
MIME type:application/x-dosexec
MD5 hash: 1d0d8d12806c0c4920f78fc067de7eb6
SHA1 hash: f453c5a7afe1e7ed629128d2033dc7243ed871db
SHA3-384 hash: e0e253e7b6713e185d3ece61401ed3a6f90b9bb721dd8d1d5f02d285c9c78ffb4e16256d256faf9d4dd6faf4f288f59a
First seen:2024-10-10 14:43:33 UTC
Last seen:Never
Sightings:1
imphash : 0ebb3c09b06b1666d307952e824c8697
ssdeep : 12288:SJOeE/IyiAF2klXyWArKldsWse3YwLFKSe7XIZxqVovgbXvY5:SgeYIyi02yyWAridlFJKJTaqVoIbvm
TLSH :n/a
telfhash :n/a
gimphash :n/a
File icon (PE):PE icon
dhash icon : 848c5454baf47474

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:064c6d76-8716-11ef-b6ec-42010aa4000b
File name:1d0d8d12806c0c4920f78fc067de7eb6
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.Asprotect-3
Signature:PUA.Win.Packer.AsprotectSke-3
Signature:SecuriteInfo.com.Generic14.QZA.18608.21931.5154.UNOFFICIAL
Signature:SecuriteInfo.com.Trojan.Starter.3689.15825.25222.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:detect_Redline_Stealer
Author:Varp0s
TLP:TLP:WHITE
Repository:YARAify
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey
TLP:TLP:WHITE
Repository:embee-research

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.