YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash b7cf45d8091667fc96c49d2c426900ac43aa015379ecec87cf2f74884ed699da.

Scan Results


SHA256 hash: b7cf45d8091667fc96c49d2c426900ac43aa015379ecec87cf2f74884ed699da
File size:1'282'572 bytes
File download: Original
MIME type:application/pdf
MD5 hash: 6b866fc9cdf80c276c2c6ff47e7edbf8
SHA1 hash: b518bcc6208b9576a0512df99bc9245140775562
SHA3-384 hash: 4312057ce6a5b769f69bf3ab1bfb04cf70762fe2ac86a95167ce38332f249b3ef5ae3fcade4d08ae0a5793528d063d7c
First seen:2026-03-14 15:31:33 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 24576:v2BIAmoGwXYOGRSt7yXCMplU9BHqiZKa4flyt9ZqGRYs0K48uEIVNK:41mFwoAtGXCelU9BHqkiflTGRYs0im6
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:e1f134ce-1fba-11f1-b47f-42010aa4000b
File name:API_Dokument1.PDF
Task parameters:ClamAV scan:True
Unpack:False
Share file:False

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.