YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 55a9c0ca7142aadb2c3d302d8c96ab5edcfe6ef1e95456aced418e37ce39d8fd.

Scan Results


SHA256 hash: 55a9c0ca7142aadb2c3d302d8c96ab5edcfe6ef1e95456aced418e37ce39d8fd
File size:3'510'272 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 82a1c4ee3f6e5c154e4d77f1ed3ddaff
SHA1 hash: c55eed42dee72f8a61a0b1939e318a3ddef520f0
SHA3-384 hash: 4fcd7b5730026138d98edc3655ac85c16f2a834b1e698ec7dfed890dda95ebdf0c1f055591915680c49c475db9c0b011
First seen:2026-01-10 10:29:10 UTC
Last seen:Never
Sightings:1
imphash : 5db72bb83a3a5d4adb63bb621c80e959
ssdeep : 49152:bqkbGWKE34jYHDfqCrBKvVSbB5ZANrWKa/mS5K23+gFoimkZ+uRT:JbGWKEojYHXBKvVCeNr9q553+oRmLuRT
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : e1dce66469f0b8c4

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:337c5541-ee0f-11f0-9df4-42010aa4000b
File name:400000.edfb0dce38d8f4abe8e78c9efbe1e571ecd480b02a67d.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.HTML-13301.UNOFFICIAL
Signature:Win.Malware.B0ssi-9971251-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:APT_Bitter_ZxxZ_Downloader
Author:SECUINFRA Falcon Team (@SI_FalconTeam)
Description:Detects Bitter (T-APT-17) ZxxZ Downloader
Reference:https://www.secuinfra.com/en/techtalk/whatever-floats-your-boat-bitter-apt-continues-to-target-bangladesh
TLP:TLP:WHITE
Repository:SIFalcon
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:Indicator_MiniDumpWriteDump
Author:Obscurity Labs LLC
Description:Detects PE files and PowerShell scripts that use MiniDumpWriteDump either through direct imports or string references
TLP:TLP:WHITE
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation
TLP:TLP:WHITE
Repository:YARAify
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:
Rule name:Windows_Generic_Threat_da0f3cbb
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:with_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the presence of an or several urls
Reference:http://laboratorio.blogs.hispasec.com/
TLP:TLP:WHITE
Rule name:without_attachments
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any attachment
Reference:http://laboratorio.blogs.hispasec.com/
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.