Task Information
| Task ID: | 39d13575-c70c-11f0-a73e-42010aa4000b |
| File name: | 131a502ef5e3993a84c869e779c19e9e |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | aachum_Stealcv2
|
| Author: | aachum |
| Description: | Detects new version of Stealc. |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | DebuggerCheck__API
|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| TLP: | TLP:WHITE |
| Rule name: | DetectEncryptedVariants
|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Heuristics_ChromeABE
|
| Author: | Still |
| Description: | attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | HUNTING_SUSP_TLS_SECTION
|
| Author: | chaosphere |
| Description: | Detect PE files with .tls section that can be used for anti-debugging |
| Reference: | Practical Malware Analysis - Chapter 16 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | classified |
| Author: | classified |
| Description: | classified |
| Reference: | classified |
| TLP : | TLP:AMBER |
| Rule name: | maldoc_getEIP_method_1
|
| Author: | Didier Stevens (https://DidierStevens.com) |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | malware_shellcode_hash
|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect shellcode api hash value |
| TLP: | TLP:WHITE |
| Repository: | JPCERTCC |
| Rule name: | NET
|
| Author: | malware-lu |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | SEH__vectored
|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| TLP: | TLP:WHITE |
| Rule name: | StealcV2
|
| Author: | Still |
| Description: | attempts to match the instructions found in StealcV2 |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | StealcV2
|
| Author: | kevoreilly |
| Description: | Stealc V2 Payload |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Sus_CMD_Powershell_Usage
|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | ThreadControl__Context
|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| TLP: | TLP:WHITE |
| Rule name: | vmdetect
|
| Author: | nex |
| Description: | Possibly employs anti-virtualization techniques |
| TLP: | TLP:WHITE |
| Repository: | |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter