YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 3116781037c3841e8b2bafc052b1eea7b53ab69ff1ef697cf7c08b38c3f4cf5c.

Scan Results


SHA256 hash: 3116781037c3841e8b2bafc052b1eea7b53ab69ff1ef697cf7c08b38c3f4cf5c
File size:91'111 bytes
File download: Original
MIME type:text/html
MD5 hash: 43de7c321839b0842860bca4a5dc1771
SHA1 hash: cb1755559b2d1c0f412d3f1294c3c4a1d191174f
SHA3-384 hash: 6de530d017151fc038bbce42db17c0532052fd9c82b7916809e2856e654b58241ddb64ed8c0a059ee2e50e73cdc08c82
First seen:2026-01-21 16:49:37 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 1536:jLKp6PJL79JCu0V1y4fcuAduNeh9lh/hQhe1R2H1hNhW3xRJBJF4KD22y7AH6B:jyOLXc1yhxRJBJFY
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:2c141a86-f6e9-11f0-9df4-42010aa4000b
File name:API_IMG-COSU6887725260-2026-ARRIVAL 1-21.shtml
Task parameters:ClamAV scan:True
Unpack:False
Share file:False

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.JS.Obfus-2340.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:ach_202409_writeHTMLasJS_phish
Author:abuse.ch
Description:Detects potential HTML phishing using writeHTMLasJS() function
TLP:TLP:WHITE
Repository:YARAify
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:telebot_framework
Author:vietdx.mb
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.