YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 19f9ae555523990a6cba5fe8590b2813519a15d7b19326404011bfb0abe2df48.
Scan Results
| SHA256 hash: | 19f9ae555523990a6cba5fe8590b2813519a15d7b19326404011bfb0abe2df48 | |
|---|---|---|
| File size: | 464'533 bytes | |
| File download: | Original | |
| MIME type: | application/x-dosexec | |
| MD5 hash: | ce363d00334023cdb11bb050a65eb80f | |
| SHA1 hash: | 4f2563c826ecae20f131233525e1b983d1e73f54 | |
| SHA3-384 hash: | b3ad94f52841bab65db830ec92d6eab2a2f274602d13a0458555f3f7c568e3d1d71d0ced80d28b39f3da7a2317e4f71e | |
| First seen: | 2022-11-24 19:41:41 UTC | |
| Last seen: | Never | |
| Sightings: | 1 | |
| imphash : | 97344a1cdf47886953601fbc70376cbb | |
| ssdeep : | 6144:3dspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nq3:t8kxNhOZElO5kkWjhD4A1 | |
| TLSH : | T14AA47D6AF7D08837D2631A38CD5B8668A836BE503E3955423BF82D4C4F7D38179263D6 | |
| telfhash : | n/a | |
| gimphash : | n/a | |
| dhash icon : | n/a | |
Tasks
There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
| Task ID: | 04f074c9-6c30-11ed-a71a-42010aa4000b | |
|---|---|---|
| File name: | 400000.FGX.EXE | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
| Signature: | PUA.Win.Packer.BorlandDelphi-5 |
|---|
| Signature: | PUA.Win.Packer.BorlandDelphi-6 |
|---|
| Signature: | PUA.Win.Packer.Upx-49 |
|---|
| Signature: | PUA.Win.Packer.UpxProtector-1 |
|---|
| Signature: | Win.Malware.Fasong-9910797-0 |
|---|
| Signature: | Win.Malware.Fasong-9918317-0 |
|---|
| Signature: | Win.Worm.Fasong-2 |
|---|
| Signature: | Win.Worm.Fasong-4 |
|---|
| Signature: | Win.Worm.Fasong-9753929-0 |
|---|
| Signature: | Win.Worm.Fasong-9753931-0 |
|---|
| Signature: | Win.Worm.Fasong-9753932-0 |
|---|
| Signature: | Win.Worm.Fasong-9806395-0 |
|---|
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | command_and_control |
|---|---|
| Author: | CD_R0M_ |
| Description: | This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group |
| TLP: | TLP:WHITE |
| Repository: | CD-R0M |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter