YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 86cf33550c0020b643fa08f63432a9e05e58420ddbb37479facc637916eb3217.

Scan Results


SHA256 hash: 86cf33550c0020b643fa08f63432a9e05e58420ddbb37479facc637916eb3217
File size:56'320 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 1383b15eb40ca1c7264b1c9e555b1def
SHA1 hash: b9f2e7902e1ff28e7a99937b47c52a7f5f361333
SHA3-384 hash: 9c1358e8cf97160bdf7b3e77e1ba8a2f4a4f9a47cd3e069a71feaac72a98bc8e7dea00d8729793c4f6ee7fbfcf0159d1
First seen:2025-11-20 23:58:09 UTC
Last seen:Never
Sightings:1
imphash : f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep : 768:rc6pUKt1ManMr3Z2NaDyBmH3UekSNZmwFvfu0YMDHPsvL7XJSxI3pmgm:rcx4DnFNaDyByfDgwsNMD6XExI3pmgm
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:c448e237-c66c-11f0-adeb-42010aa4000b
File name:1383b15eb40ca1c7264b1c9e555b1def
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Dropper.Nanocore-10030076-0
Signature:Win.Dropper.njRAT-10015886-0
Signature:Win.Trojan.Bladabindi-6192388-0
Signature:Win.Trojan.Generic-6417450-0
Signature:Win.Trojan.Generic-6454614-0
Signature:Win.Trojan.Generic-6454615-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CN_disclosed_20180208_c
Author:Florian Roth (Nextron Systems)
Description:Detects malware from disclosed CN malware set
Reference:https://twitter.com/cyberintproject/status/961714165550342146
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:CN_disclosed_20180208_c_RID2E71
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://twitter.com/cyberintproject/status/961714165550342146
TLP:TLP:WHITE
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MAL_njrat
Author:SECUINFRA Falcon Team
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Mal_WIN_NjRAT_RAT_PE
Author:Phatcharadol Thangplub
Description:Use to detect NjRAT implant.
TLP:TLP:WHITE
Repository:YARAify
Rule name:MAL_Winnti_Sample_May18_1
Author:Florian Roth (Nextron Systems)
Description:Detects malware sample from Burning Umbrella report - Generic Winnti Rule
Reference:https://401trg.pw/burning-umbrella/
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:MAL_Winnti_Sample_May18_1_RID3003
Author:Florian Roth
Description:Detects malware sample from Burning Umbrella report - Generic Winnti Rule
Reference:https://401trg.pw/burning-umbrella/
TLP:TLP:WHITE
Rule name:malware_Njrat_strings
Author:JPCERT/CC Incident Response Group
Description:detect njRAT in memory
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:MALWARE_Win_NjRAT
Author:ditekSHen
Description:Detects NjRAT / Bladabindi / NjRAT Golden
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
TLP:TLP:WHITE
Repository:
Rule name:NETexecutableMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
TLP:TLP:WHITE
Repository:
Rule name:Njrat
Author:JPCERT/CC Incident Response Group
Description:detect njRAT in memory
TLP:TLP:WHITE
Repository:
Rule name:pe_imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:Unknown_Malware_Sample_Jul17_2
Author:Florian Roth (Nextron Systems)
Description:Detects unknown malware sample with pastebin RAW URL
Reference:https://goo.gl/iqH8CK
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Unknown_Malware_Sample_Jul17_2_RID326D
Author:Florian Roth
Description:Detects unknown malware sample with pastebin RAW URL
Reference:https://goo.gl/iqH8CK
TLP:TLP:WHITE
Rule name:win_njrat_w1
Author:Brian Wallace @botnet_hunter <bwall@ballastsecurity.net>
Description:Identify njRat
TLP:TLP:WHITE
Repository:Malpedia
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:Windows_Trojan_Njrat_30f3c220
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Trojan_Njrat_30f3c220
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.