YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 334ea6600e1e0ceec8053e2b14ae1b4131e16a1ea30bfbdf99fb7e31dda34f00.

Scan Results


SHA256 hash: 334ea6600e1e0ceec8053e2b14ae1b4131e16a1ea30bfbdf99fb7e31dda34f00
File size:217'088 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 870fcd16c69640960c1ae37d4b1de504
SHA1 hash: 293540278fd7bc08a9352dd70ab96f73a7d1385d
SHA3-384 hash: e68ab80d42b1239bd7247f350d8c2c3573de15fc2be3ddfea15f3dd27f4331d656dc2c339ea9dae6ececa90c6d9550c3
First seen:2025-11-21 02:44:42 UTC
Last seen:Never
Sightings:1
imphash : 3f8d79e42b0b7cecf379b1ddce4e422a
ssdeep : 768:sDApAJmxwUh6zO5g7Wfb8BvTRbdUE6Sijv7xCIhbFjX/1H5AAXdnhg20a0kXdnh5:esASwKScoNSLDhVl9pH1juDU
TLSH : T11C242A3E54B09BA6C04C897911F55FB1D3B701B112BE6D0AD390C664E67B496FB2E38C
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:0884f03a-c684-11f0-adeb-42010aa4000b
File name:400000.Foocib32.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.Lccwin-2
Signature:SecuriteInfo.com.BackDoor.HangUp.43791.UNOFFICIAL
Signature:SecuriteInfo.com.BackDoor.HangUp.43914.UNOFFICIAL
Signature:SecuriteInfo.com.BackDoor.IRC.Tdongs.13538.21428.UNOFFICIAL
Signature:Win.Malware.Qukart-6838239-0
Signature:Win.Trojan.Berbew-9994138-0
Signature:Win.Trojan.Padodor-10016488-0
Signature:Win.Trojan.Qukart-6874817-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:Detect_Submitting
Author:NCSC-CH / GovCERT
Description:Detects login forms in HTML content
TLP:TLP:WHITE
Repository:YARAify
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
TLP:TLP:WHITE
Repository:
Rule name:meth_get_eip
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:win_berbew_strings_dec_2023
Author:Matthew @ Embee_Research
Description:Strings observed in Berbew malware.
TLP:TLP:WHITE
Repository:embee-research

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.