YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash dccdf77d3fb5dd88c0dc13109f3d56cfab0f062b2afd89ba02f49b364d2bf18d.

Scan Results


SHA256 hash: dccdf77d3fb5dd88c0dc13109f3d56cfab0f062b2afd89ba02f49b364d2bf18d
File size:5'242'876 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 67dabdd87b609ae4f3f015a6e38f07d5
SHA1 hash: 151cfff8108d5bbbcc3d3a025913fa4f229bb6d9
SHA3-384 hash: ec5f456ef04e285d61e2673d2479041c3221d6f7d2323a7979e6125109b66b1437217ea2c9d29e606080e67439c6a174
First seen:2026-04-27 21:20:33 UTC
Last seen:Never
Sightings:1
imphash : 9ecee117164e0b870a53dd187cdd7174
ssdeep : 3072:QV+LydVaND9yFm3aILEVTCW5DgSglPcTcMXaDfldx0dFJtkoeV0XXg6:GE9l9yUqIYVTH5DgSg8ajldktM0XXr
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:ed501ce4-427e-11f1-badc-42010aa4000b
File name:67dabdd87b609ae4f3f015a6e38f07d5
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:BC.Win.Exploit.Exe_With_CVE_2017_0147-6316126-2
Signature:Win.Exploit.Doublepulsar-7427328-0
Signature:Win.Ransomware.Wanacryptor-9942127-1
Signature:Win.Ransomware.Wanna-9769986-0
Signature:Win.Ransomware.WannaCry-6313787-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
TLP:TLP:WHITE
Repository:JPCERTCC
Rule name:WannaCry_Ransomware
Author:Florian Roth (Nextron Systems) (with the help of binar.ly)
Description:Detects WannaCry Ransomware
Reference:https://goo.gl/HG2j5T
TLP:TLP:WHITE
Repository:Neo23x0

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.