YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 6eca1895f09ac8a312310456a69a23956fdf63676d061263894b1f1e079e4e7e.

Scan Results


SHA256 hash: 6eca1895f09ac8a312310456a69a23956fdf63676d061263894b1f1e079e4e7e
File size:2'953'728 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 1a286af4337865c2b985e53619aced3d
SHA1 hash: 9d3b28fc4bfa872dcdaafca18fd50996072669cb
SHA3-384 hash: 5ee74a25a659f02b5040e963f536ea206b18f8c507a83211225aa4c64b0a4937c07c03db1dea9b721122b841eeaa5b63
First seen:2026-04-12 16:59:26 UTC
Last seen:Never
Sightings:1
imphash : 9f1eb76ab6beb10e56762f8019d97227
ssdeep : 49152:9GSXoV72tpV9XE8Wwi1aCvYMddluS/fYw44RxLlplSlNExV7DMaVuH:x4OEtwiICvYMZf8vEXgaVuH
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : f8f4b2e8e4f4ecf0

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:f682d5d2-3690-11f1-bfeb-42010aa4000b
File name:1a286af4337865c2b985e53619aced3d
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Win32.Expiro-1.UNOFFICIAL
Signature:SecuriteInfo.com.Win32.Expiro-2.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Capability_Embedded_Lua
Author:Obscurity Labs LLC
Description:Detects embedded Lua engines by looking for multiple Lua API symbols or env-var hooks
TLP:TLP:WHITE
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:pe_detect_tls_callbacks
Author:
TLP:TLP:WHITE
Repository:YARAify
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.