YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 2a7b1f8aaf9e5b49859a0589b76f6525f2752af8bf4462edbf3b7f6453554de8.

Scan Results


SHA256 hash: 2a7b1f8aaf9e5b49859a0589b76f6525f2752af8bf4462edbf3b7f6453554de8
File size:816'817 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 0165ed25e59a8c8c6338ec26a36c193b
SHA1 hash: cfb77a8235f0245c40a4a575a80f7faee5b86290
SHA3-384 hash: 7830d28b9e0936851590d85057f5e94a3fe82bc3c616b68cd4b611f81fa4ea9733f1ee91cd20bc3f0990f1175f9fc3ba
First seen:2025-11-21 02:57:53 UTC
Last seen:2025-11-21 06:58:42 UTC
Sightings:2
imphash : 73cb45d83a2c37eac3c661bbdc509b45
ssdeep : 12288:1nyMUtFygwvQO6Q7MV8V3SkNgtnIk5Br2xH63xMw9+I+atv1aI+UXU6kO4WqjTwF:1eFy3D7MMwIkm6x9+kt0ITXRdoIPiX9
TLSH : T15705230BFD503C22E181463D4AC47FB6A29844F22DBB7E415D786AEB3A7117A97C03D2
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 2 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:842cfa2d-c6a7-11f0-a73e-42010aa4000b
File name:421094f.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
TLP:TLP:WHITE
Repository:
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:dfdbfd20-c685-11f0-adeb-42010aa4000b
File name:41a094f.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
TLP:TLP:WHITE
Repository:
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:meth_get_eip
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
TLP:TLP:WHITE
Repository:
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:win_upx_packed
Author:Reedus0
Description:Rule for detecting UPX packed malware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.