YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash b667be249b6d14bfec580257d17b2204c4a7105ba363eb5fa98aa8bacbdb9e8c.

Scan Results


SHA256 hash: b667be249b6d14bfec580257d17b2204c4a7105ba363eb5fa98aa8bacbdb9e8c
File size:8'601'600 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 46f91b09bcf3e0e6b4e86e6f72bdc6b2
SHA1 hash: c0ac55a47eeddf80aa037847cc20f1d9c52659b2
SHA3-384 hash: e9e861f6c0f05f3322475b91676e417b13dc14c81f6ecde5b72fa09f1cb39de2cd540feda04997b1c05b6f925619480d
First seen:2026-03-25 16:23:36 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 98304:/04Pgj2jbPFxOQUpuF/CiQQRZiKfse7ZZwH8QZLn2ni5TiOh9WOiwz02gWT8MDI/:/zbvRZiKfsYZCVn5TiMJpz023xDvvt
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 70d0dccee6f6f830

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:f9882d34-2866-11f1-b47f-42010aa4000b
File name:400000.06243142467ef0cbee4ea9538eab035f.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:ditekSHen.MALWARE.Win.Trojan.RedLineDropper-AHK.UNOFFICIAL
Signature:PUA.Win.Packer.AcprotectUltraprotect-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:CMD_Ping_Localhost
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:CMD_Shutdown
Author:adm1n_usa32
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:dgaaga
Author:Harshit
Description:Detects suspicious PowerShell or registry activity
TLP:TLP:WHITE
Repository:YARAify
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_ClearWinLogs
Author:ditekSHen
Description:Detects executables containing commands for clearing Windows Event Logs
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:kill_explorer
Author:iam-py-test
Description:Detect files killing explorer.exe
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.