YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 05b3a9f44131b0b2e4bf5b4bf536dcc5622048fb5ac26df3701b472ada8d6f50.

Scan Results


SHA256 hash: 05b3a9f44131b0b2e4bf5b4bf536dcc5622048fb5ac26df3701b472ada8d6f50
File size:1'436'160 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 19eb926ff818578d90deefc8285f148c
SHA1 hash: ab602c50125f302dfeb2a8f5c03d1670b7c7efda
SHA3-384 hash: 99795fb8d4a5615107197f39c201f900ef262a5be7cf91c636d87e46865ee28be9c904f2390e362b80f223c796ed72b6
First seen:2026-03-25 16:20:34 UTC
Last seen:Never
Sightings:1
imphash : 313f08433e0871939b1dbdb197b8c964
ssdeep : 12288:f8w+g0t1xPsmf3RHNgx+Nczli4S1WFg13jz+q5fSVGQ9hk9r0QjZMXJ5:fl0tDV3AxxzUl1PtSVxDk9gB
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:8d027e40-2866-11f1-b47f-42010aa4000b
File name:19eb926ff818578d90deefc8285f148c
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Win32.Expiro-3.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.