YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 8de7a0281ebf18b697cc3b4bcbf0eff0124ec0768c5c39e404509d83c4924561.

Scan Results


SHA256 hash: 8de7a0281ebf18b697cc3b4bcbf0eff0124ec0768c5c39e404509d83c4924561
File size:300'032 bytes
File download: Original Unpacked
MIME type:application/x-dosexec
MD5 hash: eeac8b3368ce99af11557d3ae22eb06b
SHA1 hash: a91c34162e066aaadb20b54dc3591c727b24171d
SHA3-384 hash: b1f532922fb9e6f37ea14f638c272dbe1453733b1662da9ca06a08b22e569896f69f9618cde07e9a6ea10b43b8a43eb3
First seen:2024-04-14 14:08:43 UTC
Last seen:Never
Sightings:1
imphash : f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep : 768:+pcN6Rpwdiq/VNQ45NO/fSnjx/TYcTFpS12fEWePGJ7:+prpwdj3dSXu1/TYcTFpS12fEWePG
TLSH :n/a
telfhash :n/a
gimphash :n/a
File icon (PE):PE icon
dhash icon : f0c88e97839edcf0

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:809cde92-fa68-11ee-9d82-42010aa4000b
File name:eeac8b3368ce99af11557d3ae22eb06b
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Malware.Barys-6836745-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:ByteCode_MSIL_Backdoor_LimeRAT
Author:ReversingLabs
Description:Yara rule that detects LimeRAT backdoor.
TLP:TLP:WHITE
Rule name:LimeRAT
Author:RustyNoob619
Description:Detects Lime RAT malware samples based on the strings matched
TLP:TLP:WHITE
Repository:YARAify
Rule name:MALWARE_Win_LimeRAT
Author:ditekSHen
Description:LimeRAT payload
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:MALWARE_Win_LimeRAT
Description:LimeRAT payload
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
TLP:TLP:WHITE
Repository:
Rule name:NETexecutableMicrosoft
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:pe_imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:win_limerat_j1_00cfd931
Author:Johannes Bader
Description:detects the lime rat
TLP:TLP:WHITE
Repository:YARAify
Rule name:Windows_Trojan_Limerat_24269a79
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.