YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 67ae505315b432a407f9292fa1cdf8cb32ac6b1f289c4532ce2f89b64fbf2b39.

Scan Results


SHA256 hash: 67ae505315b432a407f9292fa1cdf8cb32ac6b1f289c4532ce2f89b64fbf2b39
File size:768'000 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: badd61c44ee4722bbefad9611944055b
SHA1 hash: d2964883129d5e856a44b6cfeef284e0d86e1b07
SHA3-384 hash: 8527c958532403ff6d2edec29a4b35b154097b5f00f8ac80a1accfafe8e0b8030326dcd8e244f726c37aea88f159c8c8
First seen:2026-03-10 03:22:51 UTC
Last seen:Never
Sightings:1
imphash : 5271d5ce8b44dd47bc92563e27585466
ssdeep : 12288:XMmCy32iEtt0MAmWIeZUw3NLdxw+g/MjijZ8ZzlHBqrqMNjAjVF4n9BRuxr2DNye:8mCy32d2MAA4UwdLdxw+g/Mji98ZhBYh
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:6b8d8667-1c30-11f1-b47f-42010aa4000b
File name:66e70000.msvcr100.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.