Task Information
Task ID: f1056e65-3690-11f1-bfeb-42010aa4000b
File name: 400000.fe05d777837eaf880ac43d0d7c25a44a.exe
Task parameters: ClamAV scan: True
Unpack: False
Share file: True
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
Rule name: classified
Author: classified
Description: classified
TLP : TLP:AMBER
Rule name: asyncrat
Alert
Author: JPCERT/CC Incident Response Group
Description: detect AsyncRat in memory
Reference: internal research
TLP: TLP:WHITE
Repository: CAPE
Rule name: Costura_Protobuf
Alert
Author: @bartblaze
Description: Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary.
TLP: TLP:WHITE
Repository: bartblaze
Rule name: CP_Script_Inject_Detector
Alert
Author: DiegoAnalytics
Description: Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP: TLP:WHITE
Repository: YARAify
Rule name: DetectEncryptedVariants
Alert
Author: Zinyth
Description: Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
TLP: TLP:WHITE
Repository: YARAify
Rule name: FreddyBearDropper
Alert
Author: Dwarozh Hoshiar
Description: Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
TLP: TLP:WHITE
Repository: YARAify
Rule name: HeavensGate
Alert
Author: kevoreilly
Description: Heaven's Gate: Switch from 32-bit to 64-mode
TLP: TLP:WHITE
Repository: CAPE
Rule name: Jupyter_infostealer
Alert
Author: CD_R0M_
Description: Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022
TLP: TLP:WHITE
Repository: CD-R0M
Rule name: Lumma_Stealer_Detection
Alert
Author: ashizZz
Description: Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference: https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
TLP: TLP:WHITE
Repository: YARAify
Rule name: malware_asyncrat
Alert
Author: JPCERT/CC Incident Response Group
Description: detect AsyncRat in memory
Reference: internal research
TLP: TLP:WHITE
Repository: JPCERTCC
Rule name: malware_asyncrat
Alert
Description: detect AsyncRat in memory
Reference: https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp
TLP: TLP:WHITE
Repository: JPCERTCC
Rule name: NET
Alert
Author: malware-lu
TLP: TLP:WHITE
Repository:
Rule name: Sus_CMD_Powershell_Usage
Alert
Author: XiAnzheng
Description: May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP: TLP:WHITE
Repository: YARAify
Rule name: win_asyncrat_w0
Alert
Author: JPCERT/CC Incident Response Group
Description: detect AsyncRat in memory
Reference: internal research
TLP: TLP:WHITE
Repository: Malpedia
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter