Authenticate for API access | If you are experiencing issues with receiving data from abuse.ch platforms via API, please ensure your requests are authenticated. ➡️ Read here for more info

YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 229d16e112b02bd1686483d3d11d5213eb675fa450d917e9b2213c119813c4fe.

Scan Results


SHA256 hash: 229d16e112b02bd1686483d3d11d5213eb675fa450d917e9b2213c119813c4fe
File size:192'512 bytes
File download: Original
MIME type:application/octet-stream
MD5 hash: 77b6a7c33f2a1fbebb45497dd006ba06
SHA1 hash: 0c809772a5978fbf6b329f347206e93e5176a5be
SHA3-384 hash: a9aedc4e6634faf3bfc2c0a50d557a61d58e11e245221afd850b8242e6efcc885fc36c868b664c5f89df52595a9a13f1
First seen:2025-10-03 03:16:57 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 3072:8qzYzBNPBw8h6rrK4kM8h6uKQTokArkmmYTW5lUOMl80Yi1jpSR:hzYlNPThmKFMg6uKQ8PkY8qO6D1j
TLSH : T1B1146C53B6C31037D5F201726A192A66D7FAC93B1673895787C84EC4FCA0683EB29367
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:6b83699c-a007-11f0-adeb-42010aa4000b
File name:2610000.shc
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:malware_PlugX_config
Author:JPCERT/CC Incident Response Group
Description:detect PlugX in memory
Reference:internal research
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:PlugX
Author:JPCERT/CC Incident Response Group
Description:detect PlugX in memory
Reference:internal research
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:win_plugx_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.plugx.
TLP:TLP:WHITE
Repository:Malpedia

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.