YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash f46eae2212f2150ca5c9b71e3d251b737cbda45a944fb8ae473ddf9ef029c39a.

Scan Results


SHA256 hash: f46eae2212f2150ca5c9b71e3d251b737cbda45a944fb8ae473ddf9ef029c39a
File size:2'463'744 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 0c27069bb5aadefdf038f85614dfbfe6
SHA1 hash: c5ee1682684941f0021e6252aa9a836a76dc91df
SHA3-384 hash: 78e576485e7dcb0e05d961fdff75bd4fdd2e39431e0d91c914416176943ec7405812a40ee16da04d61af43edadd84ea8
First seen:2025-11-21 19:02:10 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 49152:YyE/oHZNbh2Vd1ZiLgHNP4Vq7WgfhEvI64jikLMZpl1:XE/mZdh2ZZi0HVQq7jEQ6Oik8
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : f0e8cccac9c1d04b

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:95783edb-c70c-11f0-a73e-42010aa4000b
File name:0c27069bb5aadefdf038f85614dfbfe6
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Malware.Dqqd-9873189-0
Signature:Win.Malware.Dqqd-9873352-0
Signature:Win.Trojan.Wabot-6804087-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:MALWARE_Win_TWarBot
Author:ditekSHen
Description:Detect TWarBot IRC Bot
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:pe_detect_tls_callbacks
Author:
TLP:TLP:WHITE
Repository:YARAify
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.