MalwareBazaar Database

This page shows some basic information the YARA rule dgaaga including corresponding malware samples.

Database Entry


YARA Rule:dgaaga
Author:Harshit
Description:Detects suspicious PowerShell or registry activity
Firstseen:2025-05-15 19:53:24 UTC
Lastseen:2026-03-17 12:49:10 UTC
Sightings:256

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter