YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash ffee31d386024c68287d7b119986f2467eb160fc9915982f6b9be52ecba78780
.
Scan Results
SHA256 hash: | ffee31d386024c68287d7b119986f2467eb160fc9915982f6b9be52ecba78780 | |
---|---|---|
File size: | 237'568 bytes | |
File download: | Original | |
MIME type: | application/x-dosexec | |
MD5 hash: | 31d98f40aea845ad71ad89e55f61b2f4 | |
SHA1 hash: | 8490fae36723e8d6e31cb60b153ef9866362850a | |
SHA3-384 hash: | e0004ee0693056b376eb87b2acaade906b560e4bd50389e14de3eb3226041264700278271ae95a1c1258e0db85048277 | |
First seen: | 2025-04-03 02:31:08 UTC | |
Last seen: | Never | |
Sightings: | 1 | |
imphash : | af2081d1056ee4896a31fd709d669211 | |
ssdeep : | 6144:oxiOP+MrRmD+PQXhEHlIxJKqM01FloHJh7GIA4Navwn:5m+4arHlgJNGIA4kvS | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | b397a908-1033-11f0-b4a6-42010aa4000b | |
---|---|---|
File name: | 2680000.dll | |
Task parameters: | ClamAV scan: | True |
Unpack: | False | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
Signature: | Win.Dropper.Miner-7086570-0 |
---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | crime_win32_hvnc_banker_gen |
---|---|
Author: | @VK_Intel |
Description: | Detects malware banker hidden VNC |
Reference: | https://twitter.com/VK_Intel/status/1247058432223477760 |
TLP: | TLP:WHITE |
Repository: | Neo23x0 |
Rule name: | crime_win32_hvnc_zloader1_hvnc_generic |
---|---|
Author: | @VK_Intel |
Description: | Detects Zloader hidden VNC |
Reference: | https://twitter.com/malwrhunterteam/status/1240664014121828352 |
TLP: | TLP:WHITE |
Repository: | k-vitali |
Rule name: | DebuggerCheck__QueryInfo |
---|---|
Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
TLP: | TLP:WHITE |
Rule name: | HiddenVNC |
---|---|
Author: | @bartblaze |
Description: | Identifies HiddenVNC, which can start remote sessions. |
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.