YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 4d266714c06744cf9a49babaa648d9a59ff3da09472e7752f5a599a9ce14ebd6.

Scan Results


SHA256 hash: 4d266714c06744cf9a49babaa648d9a59ff3da09472e7752f5a599a9ce14ebd6
File size:1'963'912 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 6b88f0ddd90f242927679dc81c6873ca
SHA1 hash: 1160bad78d7e0153508f51f4c7cc7d9339335051
SHA3-384 hash: cf69654be052311fe09f852b74a9c1f54112b5df7543e836b609f13094df4f1c26a34d3646e5c78f2d9ce1cf56db47ed
First seen:2023-03-10 10:58:24 UTC
Last seen:Never
Sightings:1
imphash : 28a099a911237a28521d8b7ea250f089
ssdeep : 49152:yP2vyRciu3tBGFxwVGTU44Uv5N5LaHUl8o:tycuxmGTbv5Nkg
TLSH : T1C295330D6F15A0E1EE6B0B75619B973E168B6E25BB30DB4EEF60BCE25FB3AC14040541
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:7a88c866-bf32-11ed-866d-42010aa4000b
File name:6b88f0ddd90f242927679dc81c6873ca
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Adware.Smartapps-9770875-0
Signature:Sanesecurity.Malware.26557.JsHeur.UNOFFICIAL
Signature:SecuriteInfo.com.Adware.Bprotector.Q.16964.UNOFFICIAL
Signature:SecuriteInfo.com.Adware.Generic5.BPJO.9513.UNOFFICIAL
Signature:SecuriteInfo.com.Adware.Generic5.BPJR.30795.UNOFFICIAL
Signature:SecuriteInfo.com.Adware.Generic5.BPJS.6499.UNOFFICIAL
Signature:SecuriteInfo.com.Adware.Win32.AirAdInstaller.l4av.6284.7688.UNOFFICIAL
Signature:SecuriteInfo.com.Win32.Dropper-gen.25309.19163.15585.UNOFFICIAL
Signature:Win.Adware.1219995-1
Signature:Win.Adware.Agent-1237051
Signature:Win.Adware.Agent-1269298

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:PE_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Repository:
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.