YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash c0f43bb2f2bc8555f2754b35cd90a84a4f0a5ebd9fa9c25713464bbd82860437.

Scan Results


SHA256 hash: c0f43bb2f2bc8555f2754b35cd90a84a4f0a5ebd9fa9c25713464bbd82860437
File size:6'829'056 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 042d7ea5efed2c0b548075dcd2077a38
SHA1 hash: 364524d9144d5287ef8b885f04ef848928406e28
SHA3-384 hash: b0dbf745456d6c0ed7e9eac0d5988520f770df174e9f80d9f7c36f7b11d66b340aebb231298ed5b50ef0d03bdf88fafb
First seen:2025-11-21 19:03:46 UTC
Last seen:Never
Sightings:1
imphash : 7a82ffc832a28aee2c8bb0833529875e
ssdeep : 98304:8KgcRKVDjKNyfJkvAQ5V8TKLPl/DNY8at9iN8Pe:Fgcw1jKNyyvFiuI8atwN8P
TLSH : T13066A102DB09E943D5858CB21B3B5BD932256CF54E162DD2F50CFD18FFBAED26A84281
telfhash :n/a
gimphash :n/a
dhash icon : e8a43acdcf73b2cc

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:ce65e2ed-c70c-11f0-a73e-42010aa4000b
File name:042d7ea5efed2c0b548075dcd2077a38
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
Reference:classified
TLP :TLP:AMBER
Rule name:HUNTING_SUSP_TLS_SECTION
Author:chaosphere
Description:Detect PE files with .tls section that can be used for anti-debugging
Reference:Practical Malware Analysis - Chapter 16
TLP:TLP:WHITE
Repository:YARAify
Rule name:pe_detect_tls_callbacks
Author:
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.