YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash ab4fe4138b9f411215f82fb9704f4ad751110e2847023391fed4de93a477b2f1.

Scan Results


SHA256 hash: ab4fe4138b9f411215f82fb9704f4ad751110e2847023391fed4de93a477b2f1
File size:65'918 bytes
File download: Original
MIME type:application/pdf
MD5 hash: befe163e927111166b3aa319d9ed73e5
SHA1 hash: d34d0c49be08d4f4c4d8471d0c937ac08ecfab81
SHA3-384 hash: 6837ea0381e60ae0a613e5c43815ca0560730cd0d468f301d7c146e9672efc7c8a8768344614e0762fae3dadc1a06ae8
First seen:2026-03-15 10:01:58 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 1536:jsV0LYhfr84n/H78E1omXxW1jspgZZAAMzb3QuGtTwxwq:4VWYhfr8QoulHwtMfBOwxwq
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:01483e3f-2056-11f1-b47f-42010aa4000b
File name:API_Charges Invoice - Order 10000049896754 - Ticketnew.pdf
Task parameters:ClamAV scan:True
Unpack:False
Share file:False

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.