YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash ba7e8eadcb90e6abd2bd0de458206e7923cfeafd754654ea72f46ad6ed960dff.

Scan Results


SHA256 hash: ba7e8eadcb90e6abd2bd0de458206e7923cfeafd754654ea72f46ad6ed960dff
File size:251'347 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: ef791f554a5857d4a83bb5201866f698
SHA1 hash: c0b3517ad43b1ab0a767f972aa6cc62d62a4f14a
SHA3-384 hash: 21196dd940699c9b7504cd839c356ae65823b88c12ad3d43dc9b85f6c682ee254bf60c6cea21e0794a396f452c50a977
First seen:2025-11-21 02:59:34 UTC
Last seen:Never
Sightings:1
imphash : d2cc5dd5423899d51a0472de6b297f7d
ssdeep : 3072:mQhF5WX9dkozu5IpvPpHQkY15vMYKbOOcBQ7R6M/1oICb05T744I2+pyIXc:G9iI1RPY1BMYKbOOMgNNzCb0ivLX
TLSH : T1B2344B66F2E04C36D1736A349E2A46A5A836FE103A35DC4F77EC1C4C8F3969179253A3
telfhash :n/a
gimphash :n/a
dhash icon : d0c0c4a3f0dcdad2

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:1c16208d-c686-11f0-adeb-42010aa4000b
File name:400000.96f68bb9-8cd6-4aac-b351-af6637370fd5.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.UpxProtector-1

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:pe_detect_tls_callbacks
Author:
TLP:TLP:WHITE
Repository:YARAify
Rule name:ScanStringsInsocks5systemz
Author:Byambaa@pubcert.mn
Description:Scans presence of the found strings using the in-house brute force method
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXProtectorv10x2
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:win_upx_packed
Author:Reedus0
Description:Rule for detecting UPX packed malware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.