YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash a4a08beb474fd231db652ba3e8a5baad239dc44545f7441e0b816e4b8e677656.

Scan Results


SHA256 hash: a4a08beb474fd231db652ba3e8a5baad239dc44545f7441e0b816e4b8e677656
File size:2'116'291 bytes
File download: Original Unpacked
MIME type:application/x-dosexec
MD5 hash: 0e1e7d8a9ed0e51e46003a5fb65e7b43
SHA1 hash: f060732dfa6b2f3a66bbe4d3321a67334527018b
SHA3-384 hash: c39a7ec94753aca53ee316e921d5aa8bd2655282cfad5638584eee65cd17de2e3eee41dc549659d087dc6ca036f4f069
First seen:2026-04-27 15:07:27 UTC
Last seen:Never
Sightings:1
imphash : 0ecb871a29de9f88e5b587dee21417c7
ssdeep : 49152:jhuz3F2wjqDeLrSaSJQ6X8l3m3dNRE3DJgUO:j0z3F/q75JQ6gW3dNR2g
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:ce0909c8-424a-11f1-badc-42010aa4000b
File name:0e1e7d8a9ed0e51e46003a5fb65e7b43
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Malware.SillyWNSE-9941487-1
Signature:Win.Trojan.SillyWNSE-9941497-1
Signature:Win.Worm.Generickdz-9802585-0
Signature:Win.Worm.SillyWNSE-7785029-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.