Task Information
Task ID: 6292d503-4248-11f1-badc-42010aa4000b
File name: 2529adeeb4a44d6ff35e97decfd47f4d
Task parameters: ClamAV scan: True
Unpack: False
Share file: True
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: DebuggerCheck__API
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: classified
Author: classified
Description: classified
Rule name: DetectEncryptedVariants
Alert
Author: Zinyth
Description: Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
TLP: TLP:WHITE
Repository: YARAify
Rule name: lsadump
Alert
Author: Benjamin DELPY (gentilkiwi)
Description: LSA dump programe (bootkey/syskey) – pwdump and others
TLP: TLP:WHITE
Repository: Neo23x0
Rule name: MD5_Constants
Alert
Author: phoul (@phoul)
Description: Look for MD5 constants
TLP: TLP:WHITE
Repository:
Rule name: ProgramLanguage_Rust
Alert
Author: albertzsigovits
Description: Application written in Rust programming language
TLP: TLP:WHITE
Repository:
Rule name: Rustyloader_mem_loose
Alert
Author: James_inthe_box
Description: Corroded buerloader
Reference: https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
TLP: TLP:WHITE
Repository: silence-is-best
Rule name: SEH__vectored
Alert
Reference: https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP: TLP:WHITE
Rule name: VECT_Ransomware
Alert
Author: Mustafa Bakhit
Description: Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
TLP: TLP:WHITE
Repository: YARAify
Rule name: classified
Author: classified
Description: classified
TLP : TLP:AMBER
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter