YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash f6097ff445a7637e59c7af0e1c641677c4d6ab7c4828a69deb2755580ec7fcc3.

Scan Results


SHA256 hash: f6097ff445a7637e59c7af0e1c641677c4d6ab7c4828a69deb2755580ec7fcc3
File size:602'112 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 3afaffdb68fd8921f2fce3cdb8a7de4f
SHA1 hash: ed6c4661638590531dc49b6e63fcea44ce963e10
SHA3-384 hash: 030aefa95e4f5176446fd7c3c2c659275bc9829e4377d7fdee8b1685c0b4698c6d684cfe009e9c60086eb4c772277d72
First seen:2025-11-20 11:46:02 UTC
Last seen:Never
Sightings:1
imphash :n/a
ssdeep : 3072:nPUDwRvjxCb5NgX1RQjZ3phRrbS3R4jdNqTqHLklZpb4RrRDwRQjZ3phRrbaa:PIkKggxphoafcE1xph
TLSH : T187D4BE2D355F86F1C359867D4825CB92C27AFF41C965750377D83B0BDA722C38A2A3A2
telfhash :n/a
gimphash :n/a
dhash icon : da2b23cad3d3939a

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:7d68986a-c606-11f0-adeb-42010aa4000b
File name:400000.666F54EF0EBC0B6C9768B5D8C44B704E.exe
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:Win.Dropper.Tinba-9943147-2
Signature:Win.Malware.Cosmu-10013266-0
Signature:Win.Malware.Cosmu-10019841-0
Signature:Win.Malware.Jaik-10022565-0
Signature:Win.Worm.Cosmu-10018412-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
TLP:TLP:WHITE
Repository:diˈtekSHən
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
TLP:TLP:WHITE
Repository:
Rule name:meth_get_eip
Author:Willi Ballenthin
TLP:TLP:WHITE
Repository:YARAify
Rule name:TeslaCryptPackedMalware
TLP:TLP:WHITE
Repository:MalwareBazaar

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.