Task Information
| Task ID: | 5f39f34f-4c95-11f0-9b97-42010aa4000b |
| File name: | b64692cb799f2fe0db493170cd754bd3 |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | Detect_PowerShell_Obfuscation
|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | DotNet_Reactor
|
| Author: | @bartblaze |
| Description: | Identifies .NET Reactor, which offers .NET code protection such as obfuscation, encryption and so on. |
| TLP: | TLP:WHITE |
| Repository: | bartblaze |
| Rule name: | MD5_Constants
|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | NET
|
| Author: | malware-lu |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | PureCrypter
|
| Author: | @bartblaze |
| Description: | Identifies PureCrypter, .NET loader and obfuscator. |
| Reference: | https://malpedia.caad.fkie.fraunhofer.de/details/win.purecrypter |
| TLP: | TLP:WHITE |
| Repository: | bartblaze |
| Rule name: | Sus_CMD_Powershell_Usage
|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE
|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter