YARAify Scan Results
You are viewing the YARAify database entry for the file with the SHA256 hash c351dc3d7c8139e953a48f8455b1b1a8c98ffcf7b38bdebdf18533b81bc961e3.
Scan Results
| SHA256 hash: | c351dc3d7c8139e953a48f8455b1b1a8c98ffcf7b38bdebdf18533b81bc961e3 | |
|---|---|---|
| File size: | 149'756 bytes | |
| File download: | Original | |
| MIME type: | application/pdf | |
| MD5 hash: | 0027b0f59d123c22b8bc3dc5f179212e | |
| SHA1 hash: | 483b0e238eb69d926cf241e83c6b6df2f27ff3c1 | |
| SHA3-384 hash: | a34693b7416d987b8e200b9593f2982225bf16c4a911fb6e8a9a8cb58ba20edab9bb8d47d56313799d0d5f217eb84fe3 | |
| First seen: | 2026-01-15 10:54:08 UTC | |
| Last seen: | 2026-01-15 23:03:20 UTC | |
| Sightings: | 2 | |
| imphash : | n/a | |
| ssdeep : | 3072:nr1RbNQvJrHMLGx911a5rDtfWaLbyso3rS+:7bNQxrsXhoaLbysaN | |
| TLSH : | n/a | |
| telfhash : | n/a | |
| gimphash : | n/a | |
| dhash icon : | n/a | |
Tasks
There are 2 tasks on YARAify for this particular file. The 10 most recent ones are shown below.
Task Information
| Task ID: | 628d12ad-f266-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | API_Ali Aboubacar Rakia 202601142052310000.pdf | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | False | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter
Task Information
| Task ID: | 847181bf-f200-11f0-9df4-42010aa4000b | |
|---|---|---|
| File name: | API_Ali Aboubacar Rakia 202601142052310000.pdf | |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False | |
| Share file: | False | |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter