YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 93d6819091e9290e02f56c45cb882e4082bea0efe095b133535f0e904e9911d5.

Scan Results


SHA256 hash: 93d6819091e9290e02f56c45cb882e4082bea0efe095b133535f0e904e9911d5
File size:1'253'376 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 5e2f2ffbc9cdeb162c83c2c70eebf4fc
SHA1 hash: 17fbfb60f5ddd8201897587d44b31e76e6c6b9cc
SHA3-384 hash: 296053182fbf5d292695020a9922f7e44c9a7eb78e194914a133aed4089f6c4ac4ac4f7500bd749a4ff62e6a08ec30a5
First seen:2026-02-11 17:26:09 UTC
Last seen:Never
Sightings:1
imphash : e884af5dec7c10c2bc62a3c7efcad5c4
ssdeep : 24576:WTGpL/8D9Pzf/j3qNL8nUepusudB+KJIqxHLZ:3pL/8D9rDaNL8nUepuB+OIWZ
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 3e3e22625050663c

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:c15d87d2-076e-11f1-82f6-42010aa4000b
File name:400000.opera.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Dropper.Winiga-9881431-0
Signature:Win.Dropper.Winiga-9881456-0
Signature:Win.Dropper.Winiga-9881464-0
Signature:Win.Virus.Fragtor-10004136-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.