YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 04c1c3ed94bb80544a6b1517a5e9d6d850cbd79930bb35d950c0590dd6e52aa0.

Scan Results


SHA256 hash: 04c1c3ed94bb80544a6b1517a5e9d6d850cbd79930bb35d950c0590dd6e52aa0
File size:146'473 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: de4412612d11eb4eabd57be8e654a91b
SHA1 hash: c14fe481ef5720bf3ebeddb262ee990d97d05cb0
SHA3-384 hash: 93ba1d95b039c60628058721c2a4ea509ac7c5664cbe6d208e2f8b13e7dffcc72812f8d512943423a03ffe044d8a6086
First seen:2022-11-24 19:51:19 UTC
Last seen:Never
Sightings:1
imphash : 3cc8436caa97389ddac1166e70ee7ddd
ssdeep : 1536:eyXkMq9y/Q0SXeQ2xNwjVZW3ZRXrP9FypR3PdphhG09ZD5W2Mnj2Yj0z:eVy/dseQ2HUV83ZtPwRzT7dW/
TLSH : T188E38C10F5E39C77D1B20C784C9A96B968793A202FA99852B1F95F1FDC7D2902A1C3C7
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


You can browse the 10 most recent tasks associated with this file blow.

Task Information


Task ID:5dcbf589-6c31-11ed-a71a-42010aa4000b
File name:13140000.trys.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Malware.Zusy-9957987-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
TLP:TLP:WHITE
Repository:CD-R0M

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.