YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash aa529f59a0e9607de3b6046ff6c0121b14488e1ea8d1fda89c56a1b506b45f8f.

Scan Results


SHA256 hash: aa529f59a0e9607de3b6046ff6c0121b14488e1ea8d1fda89c56a1b506b45f8f
File size:13'688'892 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 0c95ced3c6fc4bcb2433637d07fd6f5d
SHA1 hash: 7639fcc1b8114432b1c510e707f75e658d4b0eeb
SHA3-384 hash: 7e141bc20d85c2d83bd8374b4ea2a3a79e27cb367e2261ec950dcaabdd572e62c8761784875f1445397f306ac0a10165
First seen:2025-11-21 00:03:36 UTC
Last seen:Never
Sightings:1
imphash : 214feaa67f2611f337c17bded7d257ac
ssdeep : 393216:WH3cBboOBlpcco4cUdQkiInzRtV+iMnX3k7xGrkU:1bzLp9ZcZkiIFtV+iMnXU7Y
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:873ab5d0-c66d-11f0-adeb-42010aa4000b
File name:0c95ced3c6fc4bcb2433637d07fd6f5d
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.Nuitka-9992781-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
TLP:TLP:WHITE
Repository:
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:nuitka_py_compiler
Author:Nikolaos 'n0t' Totosis
Description:Executable compiled with Nuitka Python Compiler
TLP:TLP:WHITE
Repository:YARAify
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.