YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash 9485c0e094a057c0a48c490d246fb557250acb0db7da33e35cdbe0c80e270152.

Scan Results


SHA256 hash: 9485c0e094a057c0a48c490d246fb557250acb0db7da33e35cdbe0c80e270152
File size:4'678'176 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 0e034267cdf4156211cdbf80e475d70f
SHA1 hash: 33fdd4738f979f19495f25f53c6ea41f9b403ab3
SHA3-384 hash: d0b9ff2245b4aee928b17636d4db569ac7a2210cac1e25a978cafc1f9589ee6030bd59f2e7991fff88b72842bda58c26
First seen:2026-04-07 15:45:55 UTC
Last seen:Never
Sightings:1
imphash : fd50eec0f7355d6f3cdb98eb5d053c57
ssdeep : 98304:L/aj+kCZuZlepw8K474hXuDTqmfFGM63:bE+kCZuZlQLK24heDTqmNGM63
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:dd9100c1-3298-11f1-b47f-42010aa4000b
File name:0e034267cdf4156211cdbf80e475d70f
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.Trojan.Agent.15413.30307.UNOFFICIAL
Signature:SecuriteInfo.com.Virus.Win32.Tanatos.16378.4334.UNOFFICIAL
Signature:SecuriteInfo.com.W32.Agent.349E.tr.13276.10306.UNOFFICIAL
Signature:SecuriteInfo.com.W32.Agent.CPL.tr.12645.18404.UNOFFICIAL
Signature:SecuriteInfo.com.W32.Agent.CPL.tr.1319.21841.UNOFFICIAL
Signature:SecuriteInfo.com.Win32.Malware-gen.13212.17170.UNOFFICIAL
Signature:SecuriteInfo.com.Win32.Malware-gen.73575965.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
TLP:TLP:WHITE
Repository:YARAify
Rule name:DevCv5
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:PECompactv2xx
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:RANSOMWARE
Author:ToroGuitar
TLP:TLP:WHITE
Repository:YARAify
Rule name:upx_packed_elf_v1
Author:RandomMalware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.