YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash d76caa77af55b9e0b53e566b3ec9c0ae6c236fd293676ffeb03af334518fdbed.

Scan Results


SHA256 hash: d76caa77af55b9e0b53e566b3ec9c0ae6c236fd293676ffeb03af334518fdbed
File size:200'704 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 65ed43c989e9c038167f35dc0e27c152
SHA1 hash: 97e10cb47df8e0d6708173b692f013d6cddef6da
SHA3-384 hash: 7b6ca6fb081c3e7fcdcffcf26a80cb7d0761dfe3f9cc64d210828ea21f0dee0fbda70a3ba6a0daf6f01a30d31ab56378
First seen:2025-11-21 00:02:47 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 3072:zdvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6u7rFrtwmu:RvEN2U+T6i5LirrllHy4HUcMQY6arFr
TLSH : T17B14E92BFA00702ED8A3C6F05466A6A6BA212E361FD1AC4B73D1AF4534B5513B1F531F
telfhash :n/a
gimphash :n/a
dhash icon : e9f4aa8accc6c664

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:697be547-c66d-11f0-adeb-42010aa4000b
File name:400000.svchost.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:PUA.Win.Packer.ProtectSharewar-2
Signature:PUA.Win.Packer.ProtectSharewar-3
Signature:Win.Malware.Swisyn-6911629-0
Signature:Win.Malware.Swisyn-7610494-0
Signature:Win.Malware.Swisyn-9942393-0
Signature:Win.Malware.Swisyn-9942393-0
Signature:Win.Trojan.VBGeneric-6735885-0
Signature:Win.Virus.Sality-6335700-2
Signature:Win.Virus.Sality-6335700-2
Signature:Win.Virus.Sality-6747602-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:ProtectSharewareV11eCompservCMS
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:win_mofksys_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.mofksys.
TLP:TLP:WHITE
Repository:Malpedia
Rule name:Windows_Generic_Threat_2bb7fbe3
Author:Elastic Security
TLP:TLP:WHITE
Repository:elastic

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.