YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 5d213a793194a35e5a1656e5f90c2d00fae0f931f8dca6aba6b397497101a99e.

Scan Results


SHA256 hash: 5d213a793194a35e5a1656e5f90c2d00fae0f931f8dca6aba6b397497101a99e
File size:91'648 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 15a36ddbbb0c4c5cf59a8af10d48880a
SHA1 hash: 2327534509fef9ec7ac262faca0fed2140b2912d
SHA3-384 hash: 1f7ddd8c605c38da6ea3c856cd2785b697afcf8ad693acac630c199d1bd7252cebcc6fa67697122e3e6bb3006557789f
First seen:2025-11-21 02:57:00 UTC
Last seen:Never
Sightings:1
imphash : 11b9aad2295138cfa59d24bbd4f7b476
ssdeep : 1536:71sMveb4lR0daHy9v7Zc86y9U4AFRfBWAEnk:BDeb4T0daHy9DZc86yGUtnk
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : e4e4e6aba8a4b080

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:c031617f-c685-11f0-adeb-42010aa4000b
File name:15a36ddbbb0c4c5cf59a8af10d48880a
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Worm.Rungbu-9949706-0
Signature:Win.Worm.Rungbu-9949707-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:RANSOMWARE
Author:ToroGuitar
TLP:TLP:WHITE
Repository:YARAify
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.