YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash d54c5b3af922930081ab084e7ab53944898b05d7e1a69d38e7b8409da263d76d.

Scan Results


SHA256 hash: d54c5b3af922930081ab084e7ab53944898b05d7e1a69d38e7b8409da263d76d
File size:26'856 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 102a80229855b9b941969b469da75abc
SHA1 hash: e0a312eca4d0732263b5ac001966f73a54b2b023
SHA3-384 hash: 3ef3493bc301e0a84109631e945936c9dc4ba27e5d2f7df0f58ea270977032cc6bd5096fe4b93ec911490495534e9853
First seen:2025-11-20 23:54:08 UTC
Last seen:Never
Sightings:1
imphash : 6801789d7db148dcab782feacf28ecfc
ssdeep : 384:tYOJ7m19vBKSjx3q/Znd5AyEsCjMtFRHeOlghat7Pm:tYOU95Hpq/r5AKCQtPZuCm
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : 68dc8c88888ca4d4

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:342b5124-c66c-11f0-adeb-42010aa4000b
File name:102a80229855b9b941969b469da75abc
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Trojan.Generickd-177
Signature:Win.Trojan.Generickd-4481

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.