YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 6270822090a2eec18158be9259aee85c1faf90e71fa847fb3ff681ce2ce65eb0.

Scan Results


SHA256 hash: 6270822090a2eec18158be9259aee85c1faf90e71fa847fb3ff681ce2ce65eb0
File size:238'592 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: de1ed205ec3b754a76de5da97aa38ec3
SHA1 hash: c444c7e915d0e069b045bccb3959a49d2bec92e7
SHA3-384 hash: cf1ddac809d83b817758d3c4c70bf8d01d6e562ba94338ef6b3f9f6bb80869e6c4d44ffbf92ef7ec5af5f9f000de2273
First seen:2025-10-09 19:15:47 UTC
Last seen:Never
Sightings:1
imphash : f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep : 6144:6DubaBBOBIIj6HLLYLCYJqvc1Dd0JA+BHbroC+0gyU:jba+YDoC+
TLSH : T1C5348D4037D94A6BE3BE57B8B4B511168372F417AA2BC7AF1BD444FA0C63314D960BA3
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:5c3355cb-a544-11f0-adeb-42010aa4000b
File name:de1ed205ec3b754a76de5da97aa38ec3
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Malware.Msilzilla-10007231-0
Signature:Win.Packed.AsyncRAT-9938103-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
TLP:TLP:WHITE
Repository:CAPE
Rule name:asyncrat_kingrat
Author:jeFF0Falltrades
TLP:TLP:WHITE
Repository:CAPE
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
TLP:TLP:WHITE
Repository:YARAify
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_CC_Regex
Author:ditekSHen
Description:Detects executables referencing credit card regular expressions
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_Discord_Regex
Author:ditekSHen
Description:Detects executables referencing Discord tokens regular expressions
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_References_VPN
Author:ditekSHen
Description:Detects executables referencing many VPN software clients. Observed in infosteslers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon
Author:ditekSHen
Description:Detects executables with interest in wireless interface using netsh
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:malware_asyncrat
Description:detect AsyncRat in memory
Reference:https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:malware_asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:MALWARE_Win_Multi_Family_InfoStealer
Author:ditekSHen
Description:Detects Prynt, WorldWind, DarkEye, Stealerium and ToxicEye / TelegramRAT infostealers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MALWARE_Win_Prynt
Author:ditekSHen
Description:Detects Prynt infostealer
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:msil_suspicious_use_of_strreverse
Author:dr4k0nia
Description:Detects mixed use of Microsoft.CSharp and VisualBasic to use StrReverse
TLP:TLP:WHITE
Repository:
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
TLP:TLP:WHITE
Repository:
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:NETexecutableMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
TLP:TLP:WHITE
Repository:
Rule name:pe_imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Prynt
Author:ditekSHen
Description:Detects Prynt infostealer
TLP:TLP:WHITE
Repository:CAPE
Rule name:prynt_stealer
Author:Nikos 'n0t' Totosis
Description:Prynt Stealer Payload
TLP:TLP:WHITE
Repository:YARAify
Rule name:RAT_ToxicEye_StringsW
Author:albertzsigovits
Reference:https://bazaar.abuse.ch/browse/signature/toxiceye/
TLP:TLP:WHITE
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:SUSP_NET_Msil_Suspicious_Use_StrReverse
Author:dr4k0nia, modified by Florian Roth
Description:Detects mixed use of Microsoft.CSharp and VisualBasic to use StrReverse
Reference:https://github.com/dr4k0nia/yara-rules
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:telegram_bot_api
Author:rectifyq
Description:Detects file containing Telegram Bot API
TLP:TLP:WHITE
Repository:YARAify
Rule name:win_asyncrat_bytecodes
Author:Matthew @ Embee_Research
Description:Detects bytecodes present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc)
TLP:TLP:WHITE
Repository:embee-research
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
TLP:TLP:WHITE
Repository:Sandnet
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
TLP:TLP:WHITE
Repository:Malpedia
Rule name:win_stealer_generic
Author:Reedus0
Description:Rule for detecting generic stealer malware
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:win_toxiceye_w0
Author:albertzsigovits
Reference:https://bazaar.abuse.ch/browse/signature/toxiceye/
TLP:TLP:WHITE
Repository:Malpedia
Rule name:win32_async_rat
Author:Reedus0
Description:Rule for detecting AsyncRAT malware
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.