YARAify Task Results
YARAify scan results for task ID 70682ee9-ee5a-11f0-9df4-42010aa4000b.
Scan Results
| Task ID: | 70682ee9-ee5a-11f0-9df4-42010aa4000b | |
|---|---|---|
| Task parameters: | clamav_scan: | True |
| unpack: | True | |
| share_file: | True | |
| Submission time: | 2026-01-10 19:27:44 UTC | |
| Scan time: | Scan took 9 seconds | |
| File name: | WhatsApp Installer.exe | |
| File size: | 1'106'976 bytes | |
| File download: | Original Unpacked | |
| MIME type: | application/x-dosexec | |
| SHA256 hash: | 1f8c98a24f1dc2e22a18ce4218972ce83b7da4d54142d2ca0caeb05225dbc4a9 | |
| MD5 hash: | ac44b3bbb1b77c16941e3e2ed418ee30 | |
| SHA1 hash: | c18ddbba921da950f4c5e30e5b2f8731571bb872 | |
| SHA3-384 hash: | 8f440feaf2915a04e7afa4b66ed5ad874f24ec2ab51e97d2774eabf8f571f937e90a20a25c45f1ea52f8f0c41c962f34 | |
| First seen: | 2026-01-09 21:54:52 UTC | |
| Last seen: | 2026-01-10 19:27:44 UTC | |
| Sightings: | 2 | |
| imphash : | f34d5f2d4577ed6d9ceec516c1f5a744 | |
| ssdeep : | 12288:6LQP2cqyCx+Tac0RDffXJjyYpCWoNHSy5viczgJ00Iyggot+TRofXJjyNpXM0:Dc+2DR7BWYpCWo440UdmoBWNpXM0 | |
| TLSH : | n/a | |
| telfhash : | n/a | |
| dhash icon : | c4ccb392f1f192cc | |
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| TLP: | TLP:WHITE |
| Repository: |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| TLP: | TLP:WHITE |
| Repository: |
| Rule name: | pe_imphash |
|---|---|
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | Runtime_Broker_Variant_1 |
|---|---|
| Author: | Sn0wFr0$t |
| Description: | Detecting malicious Runtime Broker |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
Unpacker
The following YARA rules matched on the unpacked file.
No matches
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
No matches