YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 65ec9181e5eb2f97a0c76462113e74178d196cb68e35395905fd2980501de421.

Scan Results


SHA256 hash: 65ec9181e5eb2f97a0c76462113e74178d196cb68e35395905fd2980501de421
File size:2'306'064 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 237ff43ce7d39762a101f2f3c407cdd7
SHA1 hash: ac101e4e2bd0fd08ec3b214cd5e2edaa15a3bc9c
SHA3-384 hash: dd567574195466c4ef57b8a441175bddcea4791e4587822b6e9fa0fbb47bfba0dbdc8d09c208dfdd473def331fbd777d
First seen:2026-03-29 17:25:24 UTC
Last seen:Never
Sightings:1
imphash : c43acefdc8b4bd66c032a66d0a56548d
ssdeep : 24576:Dc+lPYru5vRJlILqLQPl5c+lPY1m/HEp6uu857c9IW1dXgfC/MHmg:DOu5qLjl5bEp6ec9IW1dXgfC/MHmg
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : e0d8cec6c6c6cce0

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:45b2b261-2b94-11f1-b47f-42010aa4000b
File name:237ff43ce7d39762a101f2f3c407cdd7
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Trojan.GenericKD.36637433.25599.32316.UNOFFICIAL
Signature:SecuriteInfo.com.Worm.AutoRun.LY.dropper.UNOFFICIAL
Signature:Win.Dropper.Ipamor-9886396-0
Signature:Win.Malware.Bulz-9885565-0
Signature:Win.Malware.Cerbu-9888703-0
Signature:Win.Malware.Dqan-9933037-0
Signature:Win.Malware.Generic-9886878-0
Signature:Win.Malware.Ursu-9936749-0
Signature:Win.Packed.Pidgeon-9909600-0
Signature:Win.Trojan.Generic-9930240-0
Signature:Win.Trojan.Generic-9939768-0
Signature:Win.Trojan.Generic-9950561-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
TLP:TLP:WHITE
Repository:YARAify
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
Reference:classified
TLP :TLP:AMBER
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:pe_detect_tls_callbacks
Author:
TLP:TLP:WHITE
Repository:YARAify
Rule name:PE_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.