Task Information
| Task ID: | be079472-0770-11f1-82f6-42010aa4000b |
| File name: | 400000.1870e69042eda56a561ed6df236ed181.exe |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CN_disclosed_20180208_Mal1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects malware from disclosed CN malware set |
| Reference: | https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | CN_disclosed_20180208_Mal1_RID2F59
|
| Author: | Florian Roth |
| Description: | Detects malware from disclosed CN malware set |
| Reference: | https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details |
| TLP: | TLP:WHITE |
| Rule name: | CP_Script_Inject_Detector
|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | FreddyBearDropper
|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter