YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash ab6b2c7bc5caa3bbf349b80a9cb20aaff3f2ed6e138852b2f6059ff4deaeb6ef.

Scan Results


SHA256 hash: ab6b2c7bc5caa3bbf349b80a9cb20aaff3f2ed6e138852b2f6059ff4deaeb6ef
File size:2'309'581 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 184be84abcbf4e098c489d3728ecd7d8
SHA1 hash: b05448a226ce786ae36fd174e25911e0a2981885
SHA3-384 hash: a25bd545ac02316f6bd3fbcfff39ce02c1a8cb823847a405062a5394889c1748927280d04c3d5d7a958a7dada20c615a
First seen:2026-04-27 14:56:26 UTC
Last seen:Never
Sightings:1
imphash : 98b62dfdc3e59f86e2d70c4065393d47
ssdeep : 24576:He6u/I8D3RSQSJhc3SDR9ifLfiD4uhwToV+/ZMOJ0FbX1016nziBsDehWZ:HOg8zYWesIc5/ZMaobXikChK
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 71f0b28a8cc8e061

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:440975c4-4249-11f1-badc-42010aa4000b
File name:184be84abcbf4e098c489d3728ecd7d8
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Trojan.CosmicDuke-3

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CosmicDuke
TLP:TLP:WHITE
Repository:Intezer
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:detect_apt_APT29
Author:@malgamy12
Description:detect_APT32_malware
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:win_cosmicduke_w0
Author:@malgamy12
Description:detect cosmicduke
TLP:TLP:WHITE
Repository:Malpedia

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.