YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 362cc3185f6dac1c8ba0fccf36fe4f46b82617070c2f460105295eed6d5a443e.

Scan Results


SHA256 hash: 362cc3185f6dac1c8ba0fccf36fe4f46b82617070c2f460105295eed6d5a443e
File size:274'432 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 403d444644a96575d8d603e3c82c469c
SHA1 hash: 5ab48d788b8ec98d9ec8844936b29841852db980
SHA3-384 hash: f24e87b36ca4ac414644059b6bd99f3d3d765e7990443d1738eef9afb97500a534443081b8c88a8114e705e3225f8539
First seen:2026-03-14 15:29:21 UTC
Last seen:Never
Sightings:1
imphash : c39257d0809c7863eb9636edb4217cc2
ssdeep : 6144:Z443XR4SH8CWBeBxi66thkbAzLks1YarGR8ej4rC5ajuDSqer5+n:VcLMBIz+YLks1YarGR8Plju3er5+n
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:93485c38-1fba-11f1-b47f-42010aa4000b
File name:403d444644a96575d8d603e3c82c469c
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Exploit.42ae-9840059-0
Signature:Win.Exploit.D3b71c-9863766-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:cobalt_strike_beacon_detected
Author:0x0d4y
Description:This rule detects cobalt strike beacons.
TLP:TLP:WHITE
Repository:YARAify
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
TLP:TLP:WHITE
Repository:YARAify
Rule name:CobaltStrike__Sleeve_BeaconLoader_VA_x86_o_v4_3_v4_4_v4_5_and_v4_6
Author:gssincla@google.com
TLP:TLP:WHITE
Repository:GCTI
Rule name:CobaltStrike_C2_Encoded_XOR_Config_Indicator
Author:yara@s3c.za.net
Description:Detects CobaltStrike C2 encoded profile configuration
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:CobaltStrike_ReflectiveLoader_RID3297
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike)
Reference:http://www.clearskysec.com/tulip
TLP:TLP:WHITE
Rule name:CobaltStrike_Sleeve_BeaconLoader_VA_x86_o_v4_3_v4_4_v4_5_and_v4_6
Author:gssincla@google.com
Description:Cobalt Strike's sleeve/BeaconLoader.VA.x86.o (VirtualAlloc) Versions 4.3 through at least 4.6
Reference:https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Cobaltstrike3
Author:Ahmet Payaslioglu | Binalyze DFIR LAB
Description:Cobalt Strike Detection
TLP:TLP:WHITE
Repository:AhmetPayaslioglu
Rule name:CobaltStrikeBeacon
Author:ditekshen, enzo & Elastic
Description:Cobalt Strike Beacon Payload
TLP:TLP:WHITE
Repository:CAPE
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:CS_beacon
Author:Etienne Maynier tek@randhome.io
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Detect_all_IPv6_variants
Author:Bierchermuesli
Description:Generic IPv6 catcher
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:HKTL_CobaltStrike_Beacon_Strings
Author:Elastic
Description:Identifies strings used in Cobalt Strike Beacon DLL
Reference:https://www.elastic.co/blog/detecting-cobalt-strike-with-memory-signatures
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:HKTL_Win_CobaltStrike
Author:threatintel@volexity.com
Description:The CobaltStrike malware family.
Reference:https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/
TLP:TLP:WHITE
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:Detects Reflective DLL injection artifacts
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:meth_peb_parsing
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:meth_stackstrings
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Description:classified
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:SUSP_XORed_Mozilla_Oct19
Author:Florian Roth
Description:Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Reference:https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force()
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
TLP:TLP:WHITE
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
TLP:TLP:WHITE
Repository:YARAify
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:win_cobalt_strike_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.cobalt_strike.
TLP:TLP:WHITE
Repository:Malpedia
Rule name:Windows_Trojan_CobaltStrike_3dc22d14
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_CobaltStrike_f0b627fc
Description:Rule for beacon reflective loader
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_CobaltStrike_f0b627fc
Author:Elastic Security
Description:Rule for beacon reflective loader
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_7bc0f998
Description:Identifies the API address lookup function leverage by metasploit shellcode
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_7bc0f998
Author:Elastic Security
Description:Identifies the API address lookup function leverage by metasploit shellcode
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_c9773203
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_c9773203
Author:Elastic Security
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.