YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 76eb22cba4b9b2412054c9fb2db63cd8d9b5ceebc6de9e9657e621c53476ed5e.

Scan Results


SHA256 hash: 76eb22cba4b9b2412054c9fb2db63cd8d9b5ceebc6de9e9657e621c53476ed5e
File size:208'896 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: ce0c09b45f9d2dd3389a7b3e9c27586c
SHA1 hash: e08375c427617fb7e55f14982fc57f8663fe5ba6
SHA3-384 hash: d74eda8cbb763647d6f3ab76f77dffac74cb65486d75f3080fce6a31edad9798b826d8fa8ebbb0bdba8a87c4f0633dfe
First seen:2023-02-11 12:21:18 UTC
Last seen:Never
Sightings:1
imphash : 5c66b3f6e9f7c9a2ca19d73ce8f8b275
ssdeep : 3072:lWaUVGkDcNlZs3s1itUk5/AhTDUlTTTb4pxC4PaZJxetcuUhf9:lWlfDSswiB58TolT3sTze
TLSH : T153145C9673A400B9ED739138C6A34B06E7B6784613B097CF07A443BAAF1BBD1653D721
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:95fb34f0-aa06-11ed-866d-42010aa4000b
File name:26a0000.dll
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Tool.MeterPreter-6294292-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:APT_Lazarus_Loader_Dec_2020_1
Author:Arkbird_SOLG
Description:Detect loader used by Lazarus group in december 2020
Reference:Internal Research
TLP:TLP:WHITE
Repository:StrangerealIntel
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:detects Reflective DLL injection artifacts
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:meth_get_eip
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:meth_peb_parsing
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Windows_Trojan_Metasploit_38b8ceec
Author:Elastic Security
Description:Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon).
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_38b8ceec
Description:Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon).
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_7bc0f998
Author:Elastic Security
Description:Identifies the API address lookup function leverage by metasploit shellcode
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_7bc0f998
Description:Identifies the API address lookup function leverage by metasploit shellcode
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_c9773203
Author:Elastic Security
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_c9773203
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Metasploit_dd5ce989
Author:Elastic Security
Description:Identifies Meterpreter DLL used by Metasploit
Reference:https://www.rapid7.com/blog/post/2015/03/25/stageless-meterpreter-payloads/
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.