YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash e87a2b71b6ca8d210ba664e1d9991cd27a3144d63ce5121c098c45593426450e.

Scan Results


SHA256 hash: e87a2b71b6ca8d210ba664e1d9991cd27a3144d63ce5121c098c45593426450e
File size:688'213 bytes
File download: Original
MIME type:application/pdf
MD5 hash: 0769834d1b61a260746a570e54cf553f
SHA1 hash: 053ef303e14871a6feb16bd02d8f8d78fe249002
SHA3-384 hash: c24d56cbeaed667dadfdfc9fce71581c9ec20ee370e56bbe32e40fafb31aab8601719ed5be22cedaf4a64714e63b6f21
First seen:2026-02-10 06:17:30 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 12288:vLpXAASasxiBpKMjTO6iXALhr7CZPB9HGP9hcC52UvyyEKCG1I:vLpXS7i7jTGXAL57wPB9HGDzTEY1I
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon :n/a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:2de1c095-0648-11f1-82f6-42010aa4000b
File name:API_LoanAgreement1770703948267.pdf
Task parameters:ClamAV scan:True
Unpack:False
Share file:False

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.