YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash c24f2c2785ef18097bfb0add88d015491b20c96cd2804b29af7a50c19a480b22.

Scan Results


SHA256 hash: c24f2c2785ef18097bfb0add88d015491b20c96cd2804b29af7a50c19a480b22
File size:35'328 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: bc6e9221e6aa742f0547d6c3df624e13
SHA1 hash: 6e8db95bedecaba46106419bc5c14442ce59ac4c
SHA3-384 hash: ef966ba09020a41037b6127b7d452557c3d3788b27f7dc44841e1595772265d2a68baf1ccfa60037ffd4c169b1aba1fb
First seen:2026-04-12 14:32:43 UTC
Last seen:Never
Sightings:1
imphash : e55c71ad1c8ec97bd04ce83ce78854b7
ssdeep : 384:V10K4V4kW/i+dROIQV7cLupcm2E3TxV7sUqlLsqQZpd1PwXjxVvpzCW91SbW7/xC:J4WXPRsV7HlXpsUqG9ZpSjxVBuI
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:77864eea-367c-11f1-bfeb-42010aa4000b
File name:bb0000.svchost.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:TH_Win_ETW_Bypass_2025_CYFARE
Author:CYFARE
Description:Windows ETW Bypass Detection Rule - 2025
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.