YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash dc5bd8628e0eca9b0e938c074df92003764be4ce38e708d053157b82ed52c421.

Scan Results


SHA256 hash: dc5bd8628e0eca9b0e938c074df92003764be4ce38e708d053157b82ed52c421
File size:5'257 bytes
File download: Original
MIME type:text/plain
MD5 hash: de31ce82fd07c8acdbf21ee8686010f5
SHA1 hash: bbf395161585eef466a3d2444a35b81b0be19616
SHA3-384 hash: 835c997932c8688ea8afa8f697bee88b035b59a8f2ea99b3d308630918f4d2de68fcb07976f33df1e8eb1b6d6cf63630
First seen:2026-03-15 13:15:35 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 96:LHWDG3Wbuy2Uk13WbBD3Ekh2ZYB/3/qYeUKj3Vuyibd6URe:rWDoNCkd2DfsZavcEyibd6UI
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:0dbd74d6-2071-11f1-b47f-42010aa4000b
File name:de31ce82fd07c8acdbf21ee8686010f5
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.PUA.PowerShell.Agent-16.UNOFFICIAL

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.