YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 35ce1a21c99b3c1d2c2d1306d122c0d2951f4a69eb04a3f71ccbc97e12fc24c8
.
Scan Results
SHA256 hash: | 35ce1a21c99b3c1d2c2d1306d122c0d2951f4a69eb04a3f71ccbc97e12fc24c8 | |
---|---|---|
File size: | 135'997 bytes | |
File download: | Original | |
MIME type: | text/html | |
MD5 hash: | 656de020479e55d16504b7254a9f5141 | |
SHA1 hash: | e644326fd4133ce9411b5bccf37943e2b66029ef | |
SHA3-384 hash: | 0f0040d62999f99733366ef87da6551f842ef1bd83d155dedc495c45ffc3dfad5592e7bdc253a2aea1917866bc81c262 | |
First seen: | 2025-10-03 03:20:02 UTC | |
Last seen: | 2025-10-03 03:23:02 UTC | |
Sightings: | 4 | |
imphash : | n/a | |
ssdeep : | 1536:mQtYu+/JaUS7N/Kn6A5ewKK9ipKH52Ki/hxn+MJRuS8UB+gDcIOVK+YiCD:mKYu+xuwnjeAzZ2/VJYgGK+o | |
TLSH : | n/a | |
telfhash : | n/a | |
gimphash : | n/a | |
dhash icon : | n/a |
Tasks
There are 4 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
Task ID: | 44ee14ec-a008-11f0-adeb-42010aa4000b | |
---|---|---|
File name: | pub | |
Task parameters: | ClamAV scan: | True |
Unpack: | True | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | html_auto_download_b64 |
---|---|
Author: | Tdawg |
Description: | html auto download |
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Rule name: | classified |
---|---|
Author: | classified |
Description: | classified |
TLP : | TLP:AMBER |
Rule name: | Sus_CMD_Powershell_Usage |
---|---|
Author: | XiAnzheng |
Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | SUSP_Websites |
---|---|
Author: | SECUINFRA Falcon Team |
Description: | Detects the reference of suspicious sites that might be used to download further malware |
TLP: | TLP:WHITE |
Repository: | SIFalcon |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
Task ID: | 20d5e7f8-a008-11f0-adeb-42010aa4000b | |
---|---|---|
File name: | pub | |
Task parameters: | ClamAV scan: | True |
Unpack: | True | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | html_auto_download_b64 |
---|---|
Author: | Tdawg |
Description: | html auto download |
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Rule name: | classified |
---|---|
Author: | classified |
Description: | classified |
TLP : | TLP:AMBER |
Rule name: | Sus_CMD_Powershell_Usage |
---|---|
Author: | XiAnzheng |
Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | SUSP_Websites |
---|---|
Author: | SECUINFRA Falcon Team |
Description: | Detects the reference of suspicious sites that might be used to download further malware |
TLP: | TLP:WHITE |
Repository: | SIFalcon |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
Task ID: | fc73fb47-a007-11f0-adeb-42010aa4000b | |
---|---|---|
File name: | pub | |
Task parameters: | ClamAV scan: | True |
Unpack: | True | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | html_auto_download_b64 |
---|---|
Author: | Tdawg |
Description: | html auto download |
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Rule name: | classified |
---|---|
Author: | classified |
Description: | classified |
TLP : | TLP:AMBER |
Rule name: | Sus_CMD_Powershell_Usage |
---|---|
Author: | XiAnzheng |
Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | SUSP_Websites |
---|---|
Author: | SECUINFRA Falcon Team |
Description: | Detects the reference of suspicious sites that might be used to download further malware |
TLP: | TLP:WHITE |
Repository: | SIFalcon |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.
Task Information
Task ID: | d9a750bd-a007-11f0-adeb-42010aa4000b | |
---|---|---|
File name: | pub | |
Task parameters: | ClamAV scan: | True |
Unpack: | True | |
Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: | html_auto_download_b64 |
---|---|
Author: | Tdawg |
Description: | html auto download |
TLP: | TLP:WHITE |
Repository: | MalwareBazaar |
Rule name: | classified |
---|---|
Author: | classified |
Description: | classified |
TLP : | TLP:AMBER |
Rule name: | Sus_CMD_Powershell_Usage |
---|---|
Author: | XiAnzheng |
Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
TLP: | TLP:WHITE |
Repository: | YARAify |
Rule name: | SUSP_Websites |
---|---|
Author: | SECUINFRA Falcon Team |
Description: | Detects the reference of suspicious sites that might be used to download further malware |
TLP: | TLP:WHITE |
Repository: | SIFalcon |
Unpacker
The following YARA rules matched on the unpacked file.
Unpacked Files
The following files could be unpacked from this sample.