YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 4d22a5b7fa4e093c7e9e132064ad5d675a4f95daa0d51c3bffe37b93bdd487e4.

Scan Results


SHA256 hash: 4d22a5b7fa4e093c7e9e132064ad5d675a4f95daa0d51c3bffe37b93bdd487e4
File size:1'441'792 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 110a762566d4af58800f72c08a1d110e
SHA1 hash: 2add71c7e041246130cda15eb4ad6c2a83667638
SHA3-384 hash: 463880b25ae578d8bdbea2a500c3338be1b011dce20808cf5c3eddece65ebd799224670436ecf7eb7247f263a4534df1
First seen:2025-11-21 02:52:54 UTC
Last seen:Never
Sightings:1
imphash : 98b62dfdc3e59f86e2d70c4065393d47
ssdeep : 12288:ce6TfPaGw/w+xoJ8D3/5xg1tKwcvJkO01Zj03k/75Bkaj8I1Jcb5rtftP8efaDs+:ce6u/i8D3RSwnAhjkuDc9RfHfie0Vt
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 71f0b28a8cc8e061

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:2d980261-c685-11f0-adeb-42010aa4000b
File name:110a762566d4af58800f72c08a1d110e
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.AcprotectUltraprotect-1
Signature:Win.Trojan.CosmicDuke-3

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CosmicDuke
TLP:TLP:WHITE
Repository:Intezer
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:detect_apt_APT29
Author:@malgamy12
Description:detect_APT32_malware
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:win_cosmicduke_w0
Author:@malgamy12
Description:detect cosmicduke
TLP:TLP:WHITE
Repository:Malpedia

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.