YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash e18266451d0dd37166ca386df6c2c2c597346bb6673081e2d184c72ff3a48a51.

Scan Results


SHA256 hash: e18266451d0dd37166ca386df6c2c2c597346bb6673081e2d184c72ff3a48a51
File size:16'111'905 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 00f3dd669040bb5d3ceaf5b2ba8ef8ef
SHA1 hash: 3ad61fb0fe4cf64611513cc15bd6a37836b0dfe7
SHA3-384 hash: 6440726d493fc661cc9ce3ca3c50ef772a2d1a51de35fe2870f4beaaf651c4a0e908d49c5bac2209c3b87b5f4d185eff
First seen:2025-11-20 23:57:33 UTC
Last seen:Never
Sightings:1
imphash : 1f75ee5de8ac0c77c6e43508555114fe
ssdeep : 196608:Chzhrrhlhrhrrh5hrRhzhrrhlhrhrrh5hr6hzhrrhlhrhrrh5hrP:F
TLSH : T1F9F6A123BB4D7E02E67D4E35C0B64711B323CD68925AA3475164F62EECFE8E01D8A2D5
telfhash :n/a
gimphash :n/a
dhash icon : 01ccc4d0c4f47c02

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:aee965a1-c66c-11f0-adeb-42010aa4000b
File name:00f3dd669040bb5d3ceaf5b2ba8ef8ef
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Malware.Generickdz-9939920-0
Signature:Win.Malware.Lunam-6911425-0
Signature:Win.Malware.Lunam-6911559-0
Signature:Win.Malware.Lunam-6911582-0
Signature:Win.Malware.Otfrem-9938522-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)
TLP:TLP:WHITE
Repository:
Rule name:PECompactv2xx
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:upx_largefile
Author:k3nr9
TLP:TLP:WHITE
Repository:YARAify
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
TLP:TLP:WHITE
Repository:
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:win_upx_packed
Author:Reedus0
Description:Rule for detecting UPX packed malware
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.