YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 829c22336f9b99e1a06a663d0e66f8704f9735588d6d43db034173eb4edcfc8f.

Scan Results


SHA256 hash: 829c22336f9b99e1a06a663d0e66f8704f9735588d6d43db034173eb4edcfc8f
File size:2'836 bytes
File download: Original
MIME type:text/plain
MD5 hash: b6b7a0c7a8bc84792de0bdc9a169068c
SHA1 hash: fc89089436168e98a0ccc77a6effc874ce405b68
SHA3-384 hash: 458fe61132463a9e6eb62be50cdbd4788852cf9614399eda4abcaca1a60f1b2e9f90495ba5b8a6cf9b0df2a49c2f345d
First seen:2026-02-10 06:17:28 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 48:bHxMjxH9RdeUOQeSKRC6TGJn8Y2bioLonnTzsOx1Kkg5awS5VqENFh3+maiujH81:bHCjxdXiQJKwOoxikgEn5VZumaiujHm
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:2ca767ae-0648-11f1-82f6-42010aa4000b
File name:b6b7a0c7a8bc84792de0bdc9a169068c
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.