Task Information
Task ID: 6ee521c9-8138-11f0-8fb7-42010aa4000b
File name: bbbf2a1995b8378350cca9da5bddd2b9
Task parameters: ClamAV scan: True
Unpack: False
Share file: True
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: botnet_plaintext_c2
Alert
Author: cip
Description: Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
TLP: TLP:WHITE
Repository: YARAify
Rule name: CP_AllMal_Detector
Alert
Author: DiegoAnalytics
Description: CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
TLP: TLP:WHITE
Repository: YARAify
Rule name: DebuggerCheck__API
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: FreddyBearDropper
Alert
Author: Dwarozh Hoshiar
Description: Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP: TLP:WHITE
Repository: YARAify
Rule name: classified
Author: classified
Description: classified
Reference: classified
TLP : TLP:AMBER
Rule name: HUNTING_SUSP_TLS_SECTION
Alert
Author: chaosphere
Description: Detect PE files with .tls section that can be used for anti-debugging
Reference: Practical Malware Analysis - Chapter 16
TLP: TLP:WHITE
Repository: YARAify
Rule name: maldoc_getEIP_method_1
Alert
Author: Didier Stevens (https://DidierStevens.com)
TLP: TLP:WHITE
Repository:
Rule name: MD5_Constants
Alert
Author: phoul (@phoul)
Description: Look for MD5 constants
TLP: TLP:WHITE
Repository:
Rule name: classified
Author: classified
Description: classified
TLP : TLP:AMBER
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter