YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 275f43743d45adb049db3c6cd3ec8abfe4ed235ae47e13e87482fe10c0057fba.

Scan Results


SHA256 hash: 275f43743d45adb049db3c6cd3ec8abfe4ed235ae47e13e87482fe10c0057fba
File size:7'636'956 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: fcac885248c03ba20410ff28d814050e
SHA1 hash: 8f30bd7499bec4476fb6a84a7b2769d0f9c81a66
SHA3-384 hash: b7863cd4e4ceda96f1affeec27b0deaa4534631345102ad4f8f28588bc34b17707f1f1d0e603e117781e0033624baf8c
First seen:2024-05-11 00:24:59 UTC
Last seen:Never
Sightings:1
imphash : d9c437d326e605585e216f67385ebed1
ssdeep : 98304:TRoeO6XTBJYazImknGzZr+HIPFtmOZ9G17xwFB5URUSKnaSOdroSCa:NoeO6XTYxmknGzwHIPHd9swFBubKT
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:e6cb4c8a-0f2c-11ef-9d82-42010aa4000b
File name:fcac885248c03ba20410ff28d814050e
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.UpxProtector-1
Signature:Win.Downloader.Johnnie-9792210-0
Signature:Win.Downloader.Johnnie-9792269-0
Signature:Win.Dropper.Gh0stRAT-6989861-0
Signature:Win.Dropper.Gh0stRAT-6991075-0
Signature:Win.Dropper.Mimikatz-9778171-1
Signature:Win.Dropper.Tiggre-9845940-0
Signature:Win.Exploit.ChinaChopper-1-7122825-1
Signature:Win.Exploit.EQGRP-6322722-0
Signature:Win.Malware.Zegost-10012524-0
Signature:Win.Tool.Mimikatz-9741197-0
Signature:Win.Tool.Mimikatz-9784738-0
Signature:Win.Tool.Mimikatz-9862656-0
Signature:Win.Tool.Mimikatz-9862659-0
Signature:Win.Tool.Mimikatz-9862662-0
Signature:Win.Tool.Mimikatz-9862700-0
Signature:Win.Tool.Shadowbrokers-10026173-0
Signature:Win.Tool.Shadowbrokers-9775051-0
Signature:Win.Tool.Shadowbrokers-9943477-0
Signature:Win.Trojan.BlackMoon-7136668-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:blackmoon_payload_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify
Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
TLP:TLP:WHITE
Repository:
Rule name:CMD_Ping_Localhost
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
TLP:TLP:WHITE
Repository:CD-R0M
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Detect_SliverFox_String
Author:huoji
Description:Detect files is `SliverFox` malware
TLP:TLP:WHITE
Repository:YARAify
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:HackTool_Producers
Description:Hacktool Producers String
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:HKTL_mimikatz_icon
Author:Arnim Rupp
Description:Detects mimikatz icon in PE file
Reference:https://blog.gentilkiwi.com/mimikatz
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:INDICATOR_TOOL_EXP_ApacheStrusts
Author:ditekSHen
Description:Detects Windows executables containing ApacheStruts exploit artifatcs
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_TOOL_EXP_EternalBlue
Author:ditekSHen
Description:Detects Windows executables containing EternalBlue explitation artifacts
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_TOOL_EXP_WebLogic
Author:ditekSHen
Description:Detects Windows executables containing Weblogic exploits commands
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_TOOL_PWS_Mimikatz
Author:ditekSHen
Description:Detects Mimikatz
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
TLP:TLP:WHITE
Repository:StrangerealIntel
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
TLP:TLP:WHITE
Repository:
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
TLP:TLP:WHITE
Repository:
Rule name:MALWARE_Win_BlackMoon
Author:ditekSHen
Description:Detects executables using BlackMoon RunTime
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:meth_get_eip
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:meth_stackstrings
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:mimikatz
Author:Benjamin DELPY (gentilkiwi)
Description:mimikatz
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Mimikatz_Samples_2014b_2
Author:Florian Roth with the help of YarGen Rule Generator
Description:Mimikatz pwassword dumper samples from the second half of 2014
Reference:not set
TLP:TLP:WHITE
Repository:
Rule name:Mimikatz_SampleSet_1
Author:Florian Roth - Florian Roth
Description:Mimikatz Rule generated from a big Mimikatz sample set
TLP:TLP:WHITE
Rule name:Mimikatz_SampleSet_5
Author:Florian Roth - Florian Roth
Description:Mimikatz Rule generated from a big Mimikatz sample set
TLP:TLP:WHITE
Rule name:Mimikatz_SampleSet_7
Author:Florian Roth - Florian Roth
Description:Mimikatz Rule generated from a big Mimikatz sample set
TLP:TLP:WHITE
Rule name:Mimikatz_SampleSet_9
Author:Florian Roth - Florian Roth
Description:Mimikatz Rule generated from a big Mimikatz sample set
TLP:TLP:WHITE
Rule name:Mimikatz_Strings
Author:Florian Roth (Nextron Systems)
Description:Detects Mimikatz strings
Reference:not set
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Mimikatz_Strings_RID2DA0
Author:Florian Roth
Description:Detects Mimikatz strings
Reference:not set
TLP:TLP:WHITE
Rule name:NSIS_April_2024
Author:NDA0N
Description:Detects NSIS installers
TLP:TLP:WHITE
Repository:YARAify
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Rule name:Ping_Command_in_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an suspicious ping command execution in an executable
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:QbotStuff
Author:anonymous
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
TLP:TLP:WHITE
Repository:
Rule name:UPXProtectorv10x2
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:
Rule name:win_mimikatz_w0
Author:Benjamin DELPY (gentilkiwi)
Description:mimikatz
TLP:TLP:WHITE
Repository:Malpedia
Rule name:with_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the presence of an or several urls
Reference:http://laboratorio.blogs.hispasec.com/
TLP:TLP:WHITE
Rule name:without_attachments
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any attachment
Reference:http://laboratorio.blogs.hispasec.com/
TLP:TLP:WHITE
Rule name:yara_template
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.