NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash c05db43c81a46b1b29555d503c89513449b6453019b61e013b9ca9b7d3d099a6.

Scan Results


SHA256 hash: c05db43c81a46b1b29555d503c89513449b6453019b61e013b9ca9b7d3d099a6
File size:2'172'416 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 61daec234b017b77163d41e1985c9322
SHA1 hash: 620281d3e8f6e31c8de165d97e5f94bf1a138ced
SHA3-384 hash: 004ba4491cc73edd8f889da24401e7110cfe1d8d03f06082e8383b6eee42a7db0b2c3c4197bff3b86eb59d633d5886dc
First seen:2025-02-16 16:32:54 UTC
Last seen:Never
Sightings:1
imphash : 9222d372923baed7aa9dfa28449a94ea
ssdeep : 49152:1IJ+Y/8o0Hs/BT+0/yIZYY40t7ZZZz/CCCCCmZ3IIemDgAWsbJ6Ra69GYu8LNjkc:1rY/R35XAY40t7ZZZz/CCCCCmZ3IIemf
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:ac18daf7-ec83-11ef-86ef-42010aa4000b
File name:1840_1037163034311616022025
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Malware.PDB-1846.UNOFFICIAL
Signature:Win.Trojan.EmbeddedDotNetBinary-9940868-0
Signature:Win.Trojan.EmbeddedReversedDLL-9940922-0
Signature:Win.Trojan.Generic-10014419-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Check_OutputDebugStringA_iat
TLP:TLP:WHITE
Repository:
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:Malware_QA_update
Author:Florian Roth (Nextron Systems)
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Malware_QA_update_RID2DAD
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
TLP:TLP:WHITE
Rule name:MALWARE_Win_CelestyBinderLoader
Author:ditekSHen
Description:Detects Celesty Binder loader
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:NETexecutableMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.