YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 6531f1ba3b50d94ba50b0f8b45f81e1bb222bf929cb492da53820e9b9bfb6bb0.

Scan Results


SHA256 hash: 6531f1ba3b50d94ba50b0f8b45f81e1bb222bf929cb492da53820e9b9bfb6bb0
File size:126'464 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: bad85c5264c7bb67811e2da69da20c74
SHA1 hash: fbbc4c922acb961d16eb40f67ea0a1d3ef13dc6c
SHA3-384 hash: f906b3d8727ed38c0ac43fe0f4478d05e05f600265d13e26184250bcf45575382278f07351cebcb041c7e19e83929301
First seen:2025-04-03 04:36:45 UTC
Last seen:Never
Sightings:1
imphash : f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep : 3072:Zn28xnE4SfnDGA7mTTd87TFbi9kN72U53TXMmr:BNnE5B7U50bwS
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:3fa0c0cd-1045-11f0-b4a6-42010aa4000b
File name:bad85c5264c7bb67811e2da69da20c74
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_CC_Regex
Author:ditekSHen
Description:Detects executables referencing credit card regular expressions
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_Discord_Regex
Author:ditekSHen
Description:Detects executables referencing Discord tokens regular expressions
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_References_VPN
Author:ditekSHen
Description:Detects executables referencing many VPN software clients. Observed in infosteslers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon
Author:ditekSHen
Description:Detects executables with interest in wireless interface using netsh
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:MALWARE_Win_CyberStealer
Author:ditekSHen
Description:Detects CyberStealer infostealer
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MALWARE_Win_StormKitty
Author:ditekSHen
Description:Detects StormKitty infostealer
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:NETexecutableMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:pe_imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:RANSOMWARE
Author:ToroGuitar
TLP:TLP:WHITE
Repository:YARAify
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Windows_Generic_Threat_2bb6f41d
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.