YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 8c2d1127cb02bb654ccd87b31842cc3348de80e27c55e926d315db78613fb5b3.

Scan Results


SHA256 hash: 8c2d1127cb02bb654ccd87b31842cc3348de80e27c55e926d315db78613fb5b3
File size:149'124 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: e1f65bf7d20cdddd481040d44c25b4b8
SHA1 hash: 431573014a7264919abe989282e4022071ecebe9
SHA3-384 hash: 8fb4ad38d1bf5359d1120c81b9f40d2a18e51d871d3a30aa7f99787a53bd2014e9097577ab3917ae9e8cc23672091cd3
First seen:2025-11-20 23:49:40 UTC
Last seen:Never
Sightings:1
imphash : 1c24e2638e684838776b7ad1c77dfa18
ssdeep : 1536:KWwa6OYkIgzwOYFuMvWInvqTgiV6ZokAI/rlghpwu/:Tz6ODIn3uM/vS4oerlut/
TLSH : T1C2E32B1777A24005EB568A346F5782D96372BD188F23B54A33643B3E3C3AD825D27B63
telfhash :n/a
gimphash :n/a
dhash icon : 04ccfee2ece4a484

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:94866973-c66b-11f0-adeb-42010aa4000b
File name:400000.shell.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Worm.Brontok-7065422-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.