YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash 74a2ad29d7ad99a8ee347498b0fb30e56abac165d5bfd02a2606488c39025b5c.
Scan Results
| SHA256 hash: | 74a2ad29d7ad99a8ee347498b0fb30e56abac165d5bfd02a2606488c39025b5c | |
|---|---|---|
| File size: | 321'143 bytes | |
| File download: | Original | |
| MIME type: | text/plain | |
| MD5 hash: | 393c8940ebb33c0a664dc00d565c8b90 | |
| SHA1 hash: | e490b657ee446abcabec46a49540bd7c64f2dc61 | |
| SHA3-384 hash: | c0d3d1c195fb8c11de523b91a974f166eef1a8e5b98fd4e0aa0525c48e610917400d19d4cc627dc113f6dd1b0b2e2e73 | |
| First seen: | 2026-03-13 19:23:47 UTC | |
| Last seen: | 2026-03-14 17:00:35 UTC | |
| Sightings: | 2 | |
| imphash : | n/a | |
| ssdeep : | 6144:AMHdLk2k1PdjFO6+JAdpBTrBkod1X5Ng2bmp8hygLUGNKJ+fkdGe:NQPpFO6M4h+orL1bmQHNK4Mce | |
| TLSH : | n/a | |
| telfhash : | n/a | |
| gimphash : | n/a | |
| dhash icon : | n/a | |
Tasks
There are 2 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
| Task ID: | 518c3e95-1fc7-11f1-b47f-42010aa4000b | |
|---|---|---|
| File name: | 74a2ad29d7ad99a8ee347498b0fb30e56abac165d5bfd02a2606488c39025b5c.ps1 | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | detect_powershell |
|---|---|
| Author: | daniyyell |
| Description: | Detects suspicious PowerShell activity related to malware execution |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | telebot_framework |
|---|---|
| Author: | vietdx.mb |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | WIN_ClickFix_Detection |
|---|---|
| Author: | dogsafetyforeverone |
| Description: | Detects ClickFix social engineering technique using 'Verify you are human' messages and malicious PowerShell commands |
| Reference: | ClickFix social engineering and malicious PowerShell commands |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter
Task Information
| Task ID: | 286520de-1f12-11f1-b47f-42010aa4000b | |
|---|---|---|
| File name: | 393c8940ebb33c0a664dc00d565c8b90 | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | True | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | detect_powershell |
|---|---|
| Author: | daniyyell |
| Description: | Detects suspicious PowerShell activity related to malware execution |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | telebot_framework |
|---|---|
| Author: | vietdx.mb |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | WIN_ClickFix_Detection |
|---|---|
| Author: | dogsafetyforeverone |
| Description: | Detects ClickFix social engineering technique using 'Verify you are human' messages and malicious PowerShell commands |
| Reference: | ClickFix social engineering and malicious PowerShell commands |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter