YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 24caa77ac796bc0cd00f677b931bdc7206fdc01706ddc56430a638a8300a7b07.

Scan Results


SHA256 hash: 24caa77ac796bc0cd00f677b931bdc7206fdc01706ddc56430a638a8300a7b07
File size:92'570 bytes
File download: Original
MIME type:application/vnd.openxmlformats-officedocument.wordprocessingml.document
MD5 hash: 259515b6fc0dd7f7f928b094f57af2fc
SHA1 hash: 62be82351d9c2f2bfdd1bdd508fc25d4f88a494c
SHA3-384 hash: 61aaf908d87db022a25d48032262f7069d38018cf766648f074c84e94959b5caeddbe810f69028eee3c6c85cf9bad420
First seen:2026-01-21 16:49:07 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 1536:ro0U6wOpnm7rZHIDr/CGD5uLmdUV4hclU9atIklxGpN94Pg42LfuUsgRPN957O5E:rFU6wOlm7rZHoCTmSuSl/IRN9AgzLtvd
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 0 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:1a694bea-f6e9-11f0-9df4-42010aa4000b
File name:259515b6fc0dd7f7f928b094f57af2fc
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.