YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash c3864324745cbf60f17291335a7ec02d1f14de1245c7ed46d1056fe71570df51.

Scan Results


SHA256 hash: c3864324745cbf60f17291335a7ec02d1f14de1245c7ed46d1056fe71570df51
File size:14'098'432 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: ba46b371217e7eeb69ba7232f636ba08
SHA1 hash: 8abb512850d2e2f29c0daac2c1ce2883bc6ce69d
SHA3-384 hash: fedf34cbc84032895f7580460105c8b262290f294b1e1d9a9b10f4f1ab2d43a6b70681e7a631c0c9c04a50dfa1fbac35
First seen:2024-07-13 03:51:04 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 196608:5oCg51zG+hXXqnsg0G8SZJVqZgwNUZt3H+3Bits:s1tULjZaPmZt38Ets
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 868d2366ac0d24b2

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:2118637c-40cb-11ef-8c9e-42010aa4000b
File name:400000.27fdedc679d4c571750041eff53d9cdf.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:ditekSHen.MALWARE.Win.Ransomware.KillMBR.UNOFFICIAL
Signature:Win.Malware.Flystudio-9875686-0
Signature:Win.Trojan.Generic-9779041-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Borland
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:Chinese_Hacktool_1014
Author:Florian Roth
Description:Detects a chinese hacktool with unknown use
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:Chinese_Hacktool_1014
Author:Florian Roth (Nextron Systems)
Description:Detects a chinese hacktool with unknown use
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
TLP:TLP:WHITE
Repository:bartblaze
Rule name:Hacktools_CN_Panda_andrew
Author:Florian Roth
Description:Disclosed hacktool set - file andrew.exe - sethc.exe Debugger backdoor
TLP:TLP:WHITE
Repository:
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
TLP:TLP:WHITE
Repository:
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
TLP:TLP:WHITE
Repository:
Rule name:meth_get_eip
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:meth_peb_parsing
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:MoleBoxv20
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:NET
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
TLP:TLP:WHITE
Repository:
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
TLP:TLP:WHITE
Repository:
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
TLP:TLP:WHITE
Repository:
Rule name:Windows_Generic_Threat_046aa1ec
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:Windows_Generic_Threat_da0f3cbb
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic
Rule name:with_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the presence of an or several urls
Reference:http://laboratorio.blogs.hispasec.com/
TLP:TLP:WHITE
Rule name:without_attachments
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any attachment
Reference:http://laboratorio.blogs.hispasec.com/
TLP:TLP:WHITE
Rule name:XiaoBa
Author:@bartblaze
Description:Identifies XiaoBa ransomware unpacked or in memory.
TLP:TLP:WHITE
Repository:bartblaze

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.