YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 5c4c5ea295f624491496f7b485ab774fc089051d5d715a1290b1b77c7c6ca867.

Scan Results


SHA256 hash: 5c4c5ea295f624491496f7b485ab774fc089051d5d715a1290b1b77c7c6ca867
File size:1'819'364 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 78cc062872bef55e50c4deba9e5fa7e8
SHA1 hash: 458e75a906daed87543ada8212e4612111e5a604
SHA3-384 hash: c976f47bd7e075b60644c33d45346230eb3c4afdb360a767ef40e82a0311b2151cdaed56311965a7cc4ed1a2d31b38f6
First seen:2022-11-24 19:55:13 UTC
Last seen:Never
Sightings:1
imphash : a9a8149443d24053a88a0cb7036bef54
ssdeep : 12288:sPFHbhuU79I8SdpD1Z3SOhGtJbHKCG6bLbeaonsJ8MK6Q9qDQ2rTIzwHJeHDt:sPdbYv8S3DjvIbMmK6Q9qEYTewpeH5
TLSH : T18785080A3B5A6C71FD4F01F086352D8A5BA1DE965F30D0A712F464CBAA6E1C27C1D2DB
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


You can browse the 10 most recent tasks associated with this file blow.

Task Information


Task ID:e90e9815-6c31-11ed-a71a-42010aa4000b
File name:280000.OWT.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:BAZT_B5_NOCEXInvalidStream
TLP:TLP:WHITE
Repository:malware-bazaar
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
TLP:TLP:WHITE
Repository:JPCERTCC

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.