YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash b5fab9889d333c721fed265c13879f11315afe346d13356d4d1d61d16cc2b9d7.

Scan Results


SHA256 hash: b5fab9889d333c721fed265c13879f11315afe346d13356d4d1d61d16cc2b9d7
File size:466'104 bytes
File download: Original
MIME type:text/plain
MD5 hash: ec7b21746a03ffd34199f1943b74fe5e
SHA1 hash: c575de9f5fe3af6b479d6b0eff608ba2cbad2c9a
SHA3-384 hash: 4f20627b5ae922cd98cd77c4bbca5dcf185e39c3b1236deb43042173da8df12e1327f7b27101e2c111fec6714d2c811a
First seen:2024-10-04 09:26:03 UTC
Last seen:2024-10-06 13:04:17 UTC
Sightings:3
imphash :n/a
ssdeep : 12288:wpJc5fLTwmpBt3bSZoWeA/3nk4I4eTrSfD:wO73lW5
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 3 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:7eaab2e7-83e3-11ef-b6ec-42010aa4000b
File name:ec7b21746a03ffd34199f1943b74fe5e
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:YARA.obfuscated_eval.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:d1201574-8301-11ef-b6ec-42010aa4000b
File name:URGENT-PAYMENT-REQUEST.js
Task parameters:ClamAV scan:True
Unpack:True
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:YARA.obfuscated_eval.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:detect_STRRAT_javascripts_Malware
Author:daniyyell
Description:Detects obfuscated JavaScript code indicative of STRRAT malware.
TLP:TLP:WHITE
Repository:YARAify
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.

Task Information


Task ID:ad369da1-8232-11ef-b6ec-42010aa4000b
File name:b5fab9889d333c721fed265c13879f11315afe346d13356d4d1d61d16cc2b9d7.js
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:YARA.obfuscated_eval.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.