YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 513d035ef742ffd3a92a906dfd4220991598c60c29248bbfc0a42d5c670d5f4e.

Scan Results


SHA256 hash: 513d035ef742ffd3a92a906dfd4220991598c60c29248bbfc0a42d5c670d5f4e
File size:15'896'752 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 0c14de8c12bc1b1db6a0855366e863c3
SHA1 hash: bb07e164ac8123eb318a9ae710bc526bec28940c
SHA3-384 hash: 98fc1b0b7ee9ddbdd443a98abb8331d84e4e1e3c79b3e8fc366d6b34da884d53b05b5f8fe56d93d0391ec9b75ae25bc9
First seen:2025-11-20 11:55:43 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 49152:K9mdP5Vhz/okUCQ+RXyt29mAKgL9PL2hIoJynL6GjX0dIdmdP5Vhz/NehCqFGFdx:ACQ+RXyt29mASAv9dQ
TLSH : T115F69A252AFB905AF3B3EE712FECA5BFC99AB2A3250D3476115143078712A41DE47738
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:d7c78f49-c607-11f0-adeb-42010aa4000b
File name:14adbf50.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Trojan.PackedNET.972-1.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:BAZT_B5_NOCEXInvalidStream
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:pe_no_import_table
Author:
Description:Detect pe file that no import table
TLP:TLP:WHITE
Repository:YARAify
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:SUSP_Double_Base64_Encoded_Executable_RID34CC
Author:Florian Roth
Description:Detects an executable that has been encoded with base64 twice
Reference:https://twitter.com/TweeterCyber/status/1189073238803877889
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.