YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 5fda79cd4fb4e381aa46b3dc4fcd7df83f42cb6594843a7ba491301833ad575c.

Scan Results


SHA256 hash: 5fda79cd4fb4e381aa46b3dc4fcd7df83f42cb6594843a7ba491301833ad575c
File size:5'267'459 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: ab6f0a27ae50d5e628043cb7d80e83f1
SHA1 hash: 15302a0585f161daa4e6e35895eda0ef5fe9185a
SHA3-384 hash: 5cb422edfc2ab60bf55c1dab16100b50b88012d2c797d6ab2d5d48509515a8d47f2f9fd9f9790d6f44cb12408d0a56bd
First seen:2026-04-27 20:54:27 UTC
Last seen:Never
Sightings:1
imphash : 2e5708ae5fed0403e8117c645fb23e5b
ssdeep : 6144:yE9l9yNqIYVTH5DgSg8ajldktM0XXruN:ywbLgPlu
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:47f08d8f-427b-11f1-badc-42010aa4000b
File name:ab6f0a27ae50d5e628043cb7d80e83f1
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:BC.Win.Exploit.Exe_With_CVE_2017_0147-6316126-2
Signature:Win.Exploit.Doublepulsar-7427328-0
Signature:Win.Ransomware.Wanacryptor-9942127-1
Signature:Win.Ransomware.Wanna-9769986-0
Signature:Win.Ransomware.WannaCry-6313787-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Armadillov1xxv2xx
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:SUSP_Imphash_Mar23_2
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:WannaCry_Ransomware
Author:Florian Roth (Nextron Systems) (with the help of binar.ly)
Description:Detects WannaCry Ransomware
Reference:https://goo.gl/HG2j5T
TLP:TLP:WHITE
Repository:Neo23x0

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.