YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash bf0101ac0c1bc92fb146ba80d19b4cb8f45d80602223596bb858dcba6120876a
.
Scan Results
SHA256 hash: | bf0101ac0c1bc92fb146ba80d19b4cb8f45d80602223596bb858dcba6120876a | |
---|---|---|
File size: | 1'553'408 bytes | |
File download: | Original | |
MIME type: | application/x-dosexec | |
MD5 hash: | c5dac72aec34dcc89e4602fe3d78cad6 | |
SHA1 hash: | c904a139cdaef5d29711b98ef312362fa5946bd6 | |
SHA3-384 hash: | b39f0d3beda04e3b6f23f05826f1331339227c3b727c38592e824a8947e97593e3d85610f9b50e8ed0637b410f184b75 | |
First seen: | 2025-08-24 22:17:16 UTC | |
Last seen: | Never | |
Sightings: | 1 | |
imphash : | 28877d46492df107820e0b11fd73235f | |
ssdeep : | 24576:0JnJM4OqTWP/+L6VMRCPU6CENltmVVdpx7fLrQWd:0JnJM4OqTWPE6ZU6CENlc7dpJLrQWd | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | 180f9d7b-8138-11f0-8fb7-42010aa4000b | |
---|---|---|
File name: | c5dac72aec34dcc89e4602fe3d78cad6 | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | SecuriteInfo.com.Win32.Expiro-3.UNOFFICIAL |
---|
Signature: | Win.Virus.Expiro-9956593-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | CP_Script_Inject_Detector |
---|---|
Author: | DiegoAnalytics |
Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | pe_detect_tls_callbacks |
---|---|
Author: | |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
---|---|
Author: | XiAnzheng |
Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter