YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 57170cd2b2a8683d2233840f5e0e29e06fdfd8592d9bb56d113aae5f1aa1ad74.

Scan Results


SHA256 hash: 57170cd2b2a8683d2233840f5e0e29e06fdfd8592d9bb56d113aae5f1aa1ad74
File size:4'071'424 bytes
File download: Original
MIME type:application/octet-stream
MD5 hash: 5f3598a2d4821a75a656b6846cbdfaa6
SHA1 hash: 9672323715ab3c27339fe02d6596faf5f0226c6d
SHA3-384 hash: 9ce5f9bb3e121050100f7b9d1f4b8a59ec2a2af3b9913f1480355d248e268e5f2199e5e69c54f37175fe4d4a43798955
First seen:2026-03-11 15:30:28 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 12288:tjqQ++YlxPSrG1aqV/kT8fUCVbfTvq0iOUfNW2fKAXnCIkWi7sXJLXFhloRWbwOD:z++Ylx0G1Y1gTiTf77nC+AONzYjYE
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:3ba668bc-1d5f-11f1-b47f-42010aa4000b
File name:4c40000.corrupt_dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
TLP:TLP:WHITE
Repository:YARAify
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
TLP:TLP:WHITE
Repository:
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:telebot_framework
Author:vietdx.mb
TLP:TLP:WHITE
Repository:YARAify
Rule name:virustotal
Author:Tracel
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.