YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash c98553dfd991a2eb21d5231410926ffb237a715525c773d19dcb8605d7806dd9.

Scan Results


SHA256 hash: c98553dfd991a2eb21d5231410926ffb237a715525c773d19dcb8605d7806dd9
File size:114'251 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: a8b9cd73b0d2f85f63950f9088568615
SHA1 hash: 386d191f92d45ff0c4f2eaa74ff27216d7045066
SHA3-384 hash: e61108ecef1e4b3e315a43b9fd3820965ddb97f21358427f0e43c4de509abaa91c07d2a53af794e294172ac236dbfe25
First seen:2024-10-18 05:09:37 UTC
Last seen:2024-10-18 05:09:37 UTC
Sightings:2
imphash : 0d0739cf5ae1a7e881c71effeaa6ecfb
ssdeep : 3072:qfzpyk1UQhKbo9ZDkfH6UwI6x8mcQ+HZ0k/:OFyk1JBAP6TPcQ+X
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


You can browse the 10 most recent tasks associated with this file blow.

Task Information


Task ID:2c1d54c3-8d0f-11ef-b6ec-42010aa4000b
File name:2590000.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:win_reveton_w0
Author:A malpedia community member
Description:targets reveton
TLP:TLP:WHITE
Repository:Malpedia
Rule name:Win32_Ransomware_Reveton
Author:ReversingLabs
Description:Yara rule that detects Reveton ransomware.
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:2c2b04ed-8d0f-11ef-b6ec-42010aa4000b
File name:2590000.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:win_reveton_w0
Author:A malpedia community member
Description:targets reveton
TLP:TLP:WHITE
Repository:Malpedia
Rule name:Win32_Ransomware_Reveton
Author:ReversingLabs
Description:Yara rule that detects Reveton ransomware.
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.