YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 55cdb2bfaccacd73f444a36d546893809e131da81334e176a3b85bb2f64e06f1.

Scan Results


SHA256 hash: 55cdb2bfaccacd73f444a36d546893809e131da81334e176a3b85bb2f64e06f1
File size:211'267 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 799de1f045d16232fe6c0820589e0c3c
SHA1 hash: 0305869f44a00109bc37d2c283ac3a7ccbd28d1c
SHA3-384 hash: edf520f5048075d27e2e3dea1f1587f7c46d417a6055752b4910fbfe75b83b793035b8581434d091bd6f41e5d5cbfffa
First seen:2026-02-11 17:23:13 UTC
Last seen:Never
Sightings:1
imphash : 5b5757e88769272925b24d64d8e7dd1e
ssdeep : 1536:dWwaMcKOER0m9mwWAAggupnhyygu9hprItErppDnq+5h/tDSZ15WwdAz9RWQaX7H:0zKR0xwWpWnhtrppDRzSZaCA7Mr
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 04ccfee2ece4a484

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:58b45456-076e-11f1-82f6-42010aa4000b
File name:400000.lsass.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Worm.Fi3erncgrqmib-9956633-0
Signature:Win.Worm.VB-675

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_EXE_Packed_MEW
Author:ditekSHen
Description:Detects executables packed with MEW
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:mew_11_xx
Author:Kevin Falcoz
Description:MEW 11
TLP:TLP:WHITE
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.