YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash b53c06e2f746c1544b6370fe5f5f905e7c9b4a5fbc5aae573abb0e4c90620d80.

Scan Results


SHA256 hash: b53c06e2f746c1544b6370fe5f5f905e7c9b4a5fbc5aae573abb0e4c90620d80
File size:3'090'818 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 057b148df4f88abb51250e9cda864d1a
SHA1 hash: 31b9ec02f6006cd828bce1c7488388d6516b51bc
SHA3-384 hash: 0d566ea5f32442c7cc8f0268d4b8df0346ad72c364ab6a04bc5be4ca443587dd0346d9a8a08f43db8298e31907d83a4b
First seen:2026-03-29 17:19:18 UTC
Last seen:Never
Sightings:1
imphash : 58708828d5c31968bd59859804ecde67
ssdeep : 49152:G4cScMPdQCDYtRsiX3IaPyupWaDy3lHa/Q3Hx4FDATud5zaY2oQF7H:ncA7Yel1
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:6b347ac8-2b93-11f1-b47f-42010aa4000b
File name:057b148df4f88abb51250e9cda864d1a
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Dropper.PoisonIvy-9876745-0
Signature:Win.Dropper.Zombie-10044477-0
Signature:Win.Malware.Generickdz-9938530-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Detect_all_IPv6_variants
Author:Bierchermuesli
Description:Generic IPv6 catcher
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_EXE_Packed_eXPressor
Author:ditekSHen
Description:Detects executables packed with eXPressor
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.