MalwareBazaar Database

This page shows some basic information the YARA rule dgaaga including corresponding malware samples.

Database Entry


YARA Rule:dgaaga
Author:Harshit
Description:Detects suspicious PowerShell or registry activity
Firstseen:2025-05-15 19:53:24 UTC
Lastseen:2025-11-16 07:10:13 UTC
Sightings:167

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter