YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash a9393b744cbe0ea9c3a8ad368bd46f8f6cd64491b010b2f803033dbc7b6185a1.

Scan Results


SHA256 hash: a9393b744cbe0ea9c3a8ad368bd46f8f6cd64491b010b2f803033dbc7b6185a1
File size:3'734'528 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 110b7c28ae30b344828c202e290a5cc6
SHA1 hash: d88ac9104effb61dc48fed02939801fe0b3de9dc
SHA3-384 hash: d61bce0a4264ed40a426fe9494c3b65b21b330173e2a44e928126bea343a3f586d018a026134c961431952dcb1bf466e
First seen:2026-03-11 15:32:59 UTC
Last seen:Never
Sightings:1
imphash : 4bec1f56b28ab6a6614f6734e69744ca
ssdeep : 98304:XK5QfeFM8YQj9iH/tX1VROqGjSp0/7LS2POfJsFV6G:gQWdYQj9A1X1VKwuLS2mRi
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 3371687869697930

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:9596dac2-1d5f-11f1-b47f-42010aa4000b
File name:110b7c28ae30b344828c202e290a5cc6
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.