YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 58711cfcaec3aad88afd9e0aad7dbc2739ce64c2cbd9f662975191fa79d31536.

Scan Results


SHA256 hash: 58711cfcaec3aad88afd9e0aad7dbc2739ce64c2cbd9f662975191fa79d31536
File size:23'375'872 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 9f496d5f9daa471913a25b5d576b947f
SHA1 hash: cd5b9c2dfe81faf27e2810b956c664feca81ee08
SHA3-384 hash: 9814258b77901a0d8c9dd79200db92f84a4e9bebb6dc8b6a839f12ce4a20c18166c6a6e7a986068639e0e35715d22fb9
First seen:2026-03-15 13:16:39 UTC
Last seen:Never
Sightings:1
imphash : 94cb2a34d9965d9ee874a9b9d4482574
ssdeep : 393216:A4SXBqLNBsVVBzsyqfM9KwiQ+rqosGViLqNjbPZSkm5v8y:xycKn+M0dQ++obHZZRy
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : e0d8cec6c6c6cce0

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:34030935-2071-11f1-b47f-42010aa4000b
File name:6b980000.mso.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
TLP:TLP:WHITE
Repository:YARAify
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:pe_detect_tls_callbacks
Author:
TLP:TLP:WHITE
Repository:YARAify
Rule name:RANSOMWARE
Author:ToroGuitar
TLP:TLP:WHITE
Repository:YARAify
Rule name:telebot_framework
Author:vietdx.mb
TLP:TLP:WHITE
Repository:YARAify
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
TLP:TLP:WHITE
Repository:YARAify
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.