YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash fd763a23bb98635fcea026b203075f3244b4208d0ea383e74e613e1902456b20.

Scan Results


SHA256 hash: fd763a23bb98635fcea026b203075f3244b4208d0ea383e74e613e1902456b20
File size:131'072 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 8f39edd74c18386db388590136f890d6
SHA1 hash: 8440dce81a887cc2a2b37f0d7d186de817d7e6a6
SHA3-384 hash: cc9810c90684402dd94fe24efa9043b900067efee462e10d1e8cb251f9f263de429dceb13c7bab991395fe583a59b44a
First seen:2025-12-26 18:10:52 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 3072:kuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/3Wxg/:kzx7ZApszolIo7lf/ipT/3W
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:3700d6ee-e286-11f0-9df4-42010aa4000b
File name:400000.RegAsm.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Malware.Delf-6957976-0
Signature:Win.Ransomware.Delf-6651871-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Azorult
Author:kevoreilly
Description:Azorult Payload
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:classified
Rule name:Trojan_W32_Gh0stMiancha_1_0_0
TLP:TLP:WHITE
Repository:
Rule name:win_azorult_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.azorult.
TLP:TLP:WHITE
Repository:Malpedia
Rule name:classified
Author:classified
TLP :TLP:GREEN
Rule name:Windows_Trojan_Azorult_38fce9ea
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.