Task Information
| Task ID: | e6cb4c8a-0f2c-11ef-9d82-42010aa4000b |
| File name: | fcac885248c03ba20410ff28d814050e |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | BLOWFISH_Constants
|
| Author: | phoul (@phoul) |
| Description: | Look for Blowfish constants |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | command_and_control
|
| Author: | CD_R0M_ |
| Description: | This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group |
| TLP: | TLP:WHITE |
| Repository: | CD-R0M |
| Rule name: | DebuggerCheck__API
|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| TLP: | TLP:WHITE |
| Rule name: | DebuggerCheck__QueryInfo
|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| TLP: | TLP:WHITE |
| Rule name: | Disable_Defender
|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | HKTL_mimikatz_icon
|
| Author: | Arnim Rupp |
| Description: | Detects mimikatz icon in PE file |
| Reference: | https://blog.gentilkiwi.com/mimikatz |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | maldoc_getEIP_method_1
|
| Author: | Didier Stevens (https://DidierStevens.com) |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | MD5_Constants
|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | mimikatz
|
| Author: | Benjamin DELPY (gentilkiwi) |
| Description: | mimikatz |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Mimikatz_Samples_2014b_2
|
| Author: | Florian Roth with the help of YarGen Rule Generator |
| Description: | Mimikatz pwassword dumper samples from the second half of 2014 |
| Reference: | not set |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | Mimikatz_SampleSet_1
|
| Author: | Florian Roth - Florian Roth |
| Description: | Mimikatz Rule generated from a big Mimikatz sample set |
| TLP: | TLP:WHITE |
| Rule name: | Mimikatz_SampleSet_5
|
| Author: | Florian Roth - Florian Roth |
| Description: | Mimikatz Rule generated from a big Mimikatz sample set |
| TLP: | TLP:WHITE |
| Rule name: | Mimikatz_SampleSet_7
|
| Author: | Florian Roth - Florian Roth |
| Description: | Mimikatz Rule generated from a big Mimikatz sample set |
| TLP: | TLP:WHITE |
| Rule name: | Mimikatz_SampleSet_9
|
| Author: | Florian Roth - Florian Roth |
| Description: | Mimikatz Rule generated from a big Mimikatz sample set |
| TLP: | TLP:WHITE |
| Rule name: | Mimikatz_Strings
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Mimikatz strings |
| Reference: | not set |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Mimikatz_Strings_RID2DA0
|
| Author: | Florian Roth |
| Description: | Detects Mimikatz strings |
| Reference: | not set |
| TLP: | TLP:WHITE |
| Rule name: | NSIS_April_2024
|
| Author: | NDA0N |
| Description: | Detects NSIS installers |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Ping_Command_in_EXE
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects an suspicious ping command execution in an executable |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | RIPEMD160_Constants
|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | SHA1_Constants
|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | SHA512_Constants
|
| Author: | phoul (@phoul) |
| Description: | Look for SHA384/SHA512 constants |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | vmdetect
|
| Author: | nex |
| Description: | Possibly employs anti-virtualization techniques |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | win_mimikatz_w0
|
| Author: | Benjamin DELPY (gentilkiwi) |
| Description: | mimikatz |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | with_urls
|
| Author: | Antonio Sanchez <asanchez@hispasec.com> |
| Description: | Rule to detect the presence of an or several urls |
| Reference: | http://laboratorio.blogs.hispasec.com/ |
| TLP: | TLP:WHITE |
| Rule name: | without_attachments
|
| Author: | Antonio Sanchez <asanchez@hispasec.com> |
| Description: | Rule to detect the no presence of any attachment |
| Reference: | http://laboratorio.blogs.hispasec.com/ |
| TLP: | TLP:WHITE |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter