MalwareBazaar Database

This page shows some basic information the YARA rule TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE including corresponding malware samples.

Database Entry


YARA Rule:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Firstseen:2026-03-18 13:51:07 UTC
Lastseen:2026-03-19 06:10:53 UTC
Sightings:42

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter