YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 093d3484e8fd63db9030466c65e73414b36329df45e6e405a7b40c0d3ff5550c.

Scan Results


SHA256 hash: 093d3484e8fd63db9030466c65e73414b36329df45e6e405a7b40c0d3ff5550c
File size:753'664 bytes
File download: Original
MIME type:application/octet-stream
MD5 hash: d4754a174916d35e986445c8408a034b
SHA1 hash: b0152c0fdfb7a5ff96988e18c84bb10f74c653d4
SHA3-384 hash: 88884e4270e5bb6debf5d310576b5a9b02f61189d59f741bde0af19a6cfe0873ceff84dd18b3f34ad0ffb0d74b668be1
First seen:2026-02-11 17:49:24 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 6144:DxKX/ZCDSK/99dTTWejVHgy/ZCDSK/99dTTWejVHgSR/ZCDSK/99dTTWejVHgS:4ZWfvWSHg0ZWfvWSHgS1ZWfvWSHgS
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:00d82c2d-0772-11f1-82f6-42010aa4000b
File name:14640000.shc
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:NETDLLMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.