YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 5cb646d0cc6f9d5f50e2cf975eb40108af364b722d5bde51644c46d98315c5a2.

Scan Results


SHA256 hash: 5cb646d0cc6f9d5f50e2cf975eb40108af364b722d5bde51644c46d98315c5a2
File size:211'267 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 53e6f6a8ce375cac513befcc23cc6a05
SHA1 hash: fd3ddabdb4f352b4e0023b118921a61c716410b4
SHA3-384 hash: e71c4c695d25924c853c4f33112023aaf0dafb3c2ecd8008a2acd2079ad8d685593f1c236908edb5c50d596664d2d517
First seen:2026-02-11 17:22:59 UTC
Last seen:Never
Sightings:1
imphash : 5b5757e88769272925b24d64d8e7dd1e
ssdeep : 1536:dWwaMcKOER0m9mwWAAggupnhyzgbxpVwQNoT7rppDnq+5h/tDSZ15WwdAz9RWQar:0zKR0xwWpWnh27rppDRzSZaCA7Mr
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 04ccfee2ece4a484

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:50005ba1-076e-11f1-82f6-42010aa4000b
File name:400000.IExplorer.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Worm.Fi3erncgrqmib-9956633-0
Signature:Win.Worm.VB-675

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_EXE_Packed_MEW
Author:ditekSHen
Description:Detects executables packed with MEW
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:mew_11_xx
Author:Kevin Falcoz
Description:MEW 11
TLP:TLP:WHITE
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.