ScreenShot
Created 2021.04.13 10:21 Machine s1_win7_x6402
Filename 40.jpg
Type PHP script, ISO-8859 text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
1.4
ZERO API file : mailcious
VT API (file) 23 detected (Webshell, Save, PhpSpy, PHPShell, bgynzy, YDWebShell, WebshellGen, Shell, R57Shell, Malicious, score, S1330, TOPIS, mNzl6Ks1geM)
md5 5906b1fd9fb562ecb3c54a1ca1f6e50d
sha256 3983ff02d45989af1d09ae13db0fdff6de1144614abca753cda74e77c50ad2d9
ssdeep 1536:d8ivjRmK1+tpDEfT6aaRGpUhigu2aixg9t7p0UJ4Tb5KCyOtuS1LCta:dNmK1+tpkGhVu2aie0UJ435KaD0Y
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure