Task Information
| Task ID: | 883f2e58-c70c-11f0-a73e-42010aa4000b |
| File name: | 400000.2b56b842-a6f7-478e-9be0-c2acc0d1bb80.exe |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | APT_DustSquad_PE_Nov19_1
|
| Author: | Arkbird_SOLG |
| Description: | Detection Rule for APT DustSquad campaign Nov19 |
| Reference: | https://twitter.com/Rmy_Reserve/status/1197448735422238721 |
| TLP: | TLP:WHITE |
| Repository: | StrangerealIntel |
| Rule name: | Borland
|
| Author: | malware-lu |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | DebuggerCheck__API
|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| TLP: | TLP:WHITE |
| Rule name: | Detect_PowerShell_Obfuscation
|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | DetectEncryptedVariants
|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | MD5_Constants
|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | SR_APT_DustSquad_PE_Nov19
|
| Author: | Arkbird_SOLG |
| Description: | Super Rule for APT DustSquad campaign Nov19 |
| Reference: | https://twitter.com/Rmy_Reserve/status/1197448735422238721 |
| TLP: | TLP:WHITE |
| Repository: | StrangerealIntel |
| Rule name: | Unk_Crime_Downloader_2
|
| Author: | @bartblaze |
| Description: | Identifies what appears to be related to PureLogs stealer, but it's likely a 2nd stage with the final stage to be downloaded. |
| TLP: | TLP:WHITE |
| Repository: | bartblaze |
| Rule name: | vmdetect
|
| Author: | nex |
| Description: | Possibly employs anti-virtualization techniques |
| TLP: | TLP:WHITE |
| Repository: | |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter