Task Information
Task ID: c08f3379-2134-11f1-b47f-42010aa4000b
File name: 140000000.exe
Task parameters: ClamAV scan: True
Unpack: False
Share file: True
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: CP_Script_Inject_Detector
Alert
Author: DiegoAnalytics
Description: Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP: TLP:WHITE
Repository: YARAify
Rule name: DebuggerCheck__API
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: DebuggerCheck__QueryInfo
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: DebuggerCheck__RemoteAPI
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: DebuggerHiding__Active
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: dgaagas
Alert
Author: Harshit
Description: Uses certutil.exe to download a file named test.txt
TLP: TLP:WHITE
Repository: YARAify
Rule name: SUSP_XORed_URL_In_EXE
Alert
Author: Florian Roth (Nextron Systems)
Description: Detects an XORed URL in an executable
Reference: https://twitter.com/stvemillertime/status/1237035794973560834
TLP: TLP:WHITE
Repository: Neo23x0
Rule name: SUSP_XORed_URL_in_EXE_RID2E46
Alert
Author: Florian Roth
Description: Detects an XORed URL in an executable
Reference: https://twitter.com/stvemillertime/status/1237035794973560834
TLP: TLP:WHITE
Rule name: ThreadControl__Context
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: VECT_Ransomware
Alert
Author: Mustafa Bakhit
Description: Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
TLP: TLP:WHITE
Repository: YARAify
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter