YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash a8c7c4a5324dc0e69e1ecc95c63e5da5d4cff103bd44eb31090ac10bf9b11fa2.

Scan Results


SHA256 hash: a8c7c4a5324dc0e69e1ecc95c63e5da5d4cff103bd44eb31090ac10bf9b11fa2
File size:13'202'824 bytes
File download: Original Unpacked
MIME type:application/x-dosexec
MD5 hash: 506f0ca9737ee52d7eb6fab6f7858f27
SHA1 hash: 955205d4232eed788beaadfa5499ad98a1fb86eb
SHA3-384 hash: 99d1de35dfafdc457c88572e5e3792ff1c61e312ad12f7a1104c6f144807bd63c24fe35719cff6fc52e4fa9ba970aacc
First seen:2024-09-11 09:36:24 UTC
Last seen:Never
Sightings:1
imphash : 587939c61b114e96778a35b6c68e40b1
ssdeep : 196608:5k0Lm68zX0eHbaHfjuM8TnacsG/5LMGXWpf8do5ZYfG:q48zke7SjwsGRwGXTy
TLSH :n/a
telfhash :n/a
gimphash :n/a
File icon (PE):PE icon
dhash icon : e8ccccc86733b2cc

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:4feb5035-7021-11ef-b6ec-42010aa4000b
File name:506f0ca9737ee52d7eb6fab6f7858f27
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Detect_APT29_WINELOADER_Backdoor
Author:daniyyell
Description:Detects APT29's WINELOADER backdoor variant used in phishing campaigns, this rule also detect bad pdf,shtml,htm and vbs or maybe more depends
Reference:https://cloud.google.com/blog/topics/threat-intelligence/apt29-wineloader-german-political-parties
TLP:TLP:WHITE
Repository:YARAify
Rule name:pe_detect_tls_callbacks
Author:
TLP:TLP:WHITE
Repository:YARAify
Rule name:PE_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Repository:
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Rule name:Rclone
Author:@bartblaze
Description:Identifies Rclone, sometimes used by attackers to exfiltrate data.
Reference:https://rclone.org/
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
TLP:TLP:WHITE
Repository:silence-is-best

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.