YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 6602ea0e1790ab472752f70932c464076e92634f27805f173e08a1d1c84d7081.

Scan Results


SHA256 hash: 6602ea0e1790ab472752f70932c464076e92634f27805f173e08a1d1c84d7081
File size:3'699'024 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 016318f7c94a79bd290ddcd35b8d079a
SHA1 hash: 11026b79f9b130f4a0667ca91af29bc637b9592a
SHA3-384 hash: cb6d865e7e82d41ddfd1c71d257ff576744e636b1f44013561b8dffdb79acec43184e9c11eaffe4de0be60c6f7cc7a82
First seen:2026-04-01 16:49:47 UTC
Last seen:Never
Sightings:1
imphash : b1a57b635b23ffd553b3fd1e0960b2bd
ssdeep : 49152:2XaYDPO6drT/3KLnbOGSYfLoEs1jBGAc/Ayf5tglHG6QywOcgjIv+D2gIwwoN7Y:2L2OrbQOUm1GhoHG6QywOckpD2gBG
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : e8b271ce23b2beba

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:cb2a6a40-2dea-11f1-b47f-42010aa4000b
File name:016318f7c94a79bd290ddcd35b8d079a
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Program.Kuaizip.1.1151.13439.UNOFFICIAL
Signature:SecuriteInfo.com.Program.Kuaizip.1.12171.20872.UNOFFICIAL
Signature:SecuriteInfo.com.Program.Kuaizip.1.12706.12096.UNOFFICIAL
Signature:SecuriteInfo.com.Program.Kuaizip.1.13675.8887.UNOFFICIAL
Signature:SecuriteInfo.com.Program.Kuaizip.1.22324.22339.UNOFFICIAL
Signature:SecuriteInfo.com.Program.Kuaizip.1.32759.26497.UNOFFICIAL
Signature:SecuriteInfo.com.Program.Unwanted.3980.UNOFFICIAL
Signature:SecuriteInfo.com.Trojan.Risis.1.Gen.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Detect_SliverFox_String
Author:huoji
Description:Detect files is `SliverFox` malware
TLP:TLP:WHITE
Repository:YARAify
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:PE_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.