YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash d6a65e865673c8a759d276968f441c4c83d76086a04b0ef555106d31d2e53c77.

Scan Results


SHA256 hash: d6a65e865673c8a759d276968f441c4c83d76086a04b0ef555106d31d2e53c77
File size:3'954'412 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 9dc150b989f4ed1e7db6c7dc7e4bf937
SHA1 hash: b3fbe6e659853a7f4a6de6740637a6e43a4c5a33
SHA3-384 hash: 0b9b731272a64207321b1318c605120ab45a2a96b4cd5130d2f762a6b756fe4c953d8143461d5d837b6d87d7776c1ed1
First seen:2025-11-21 02:57:54 UTC
Last seen:Never
Sightings:1
imphash : a414559c3bc18a8f199ef00429283945
ssdeep : 3072:o4Y4FizYxCD4nDNqkxZDSy8ACl81L4L0D1tA9YblKEzFENy9W+zpM:RFJ/nJq0ZGy8ACviz
TLSH : T1A806F707DEAB6E91FD2105FF46B241934E78FE122571CE0AA6C9271A74FC12B49907BC
telfhash :n/a
gimphash :n/a
dhash icon : d6cadad2daec8ac2

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:e0b3842b-c685-11f0-adeb-42010aa4000b
File name:400000.38d86e4c-2482-430d-8ab9-69c93dad36ef.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Detect_SliverFox_String
Author:huoji
Description:Detect files is `SliverFox` malware
TLP:TLP:WHITE
Repository:YARAify
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP:TLP:WHITE
Repository:YARAify
Rule name:PE_Digital_Certificate
Author:albertzsigovits
TLP:TLP:WHITE
Repository:
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:win_upx_packed
Author:Reedus0
Description:Rule for detecting UPX packed malware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.