YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 17b6fd751c480b1cbd0eac4642d84c84cf2d5afd8b74834e368d6abaabe36f7d.

Scan Results


SHA256 hash: 17b6fd751c480b1cbd0eac4642d84c84cf2d5afd8b74834e368d6abaabe36f7d
File size:150'196 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: f0b1ebbcfa6dfa9f62408d8b6df13f9f
SHA1 hash: 84f19572f1ef872010b4834cb6226189948504e2
SHA3-384 hash: 5d99b3283ca22b3288f021b10b8a2d467e50484707ea81dff8ef37175e7d32ba16cccd1048931ea27edd200add20698d
First seen:2025-11-20 23:49:18 UTC
Last seen:Never
Sightings:1
imphash : 93f7f3393c5887e9c17a8524d0b7054a
ssdeep : 1536:BWwa6OYkIgzwOYFu/vWInvqTgiV6ZokAGfrlghpwuD:Az6ODIn3u//vS4oorlutD
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 04ccfee2ece4a484

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:87c4a0f7-c66b-11f0-adeb-42010aa4000b
File name:400000.f08f5033-1113-47a8-8990-1975963fc870.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Worm.Brontok-7065422-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.