ScreenShot
Created 2021.04.17 10:26 Machine s1_win7_x6401
Filename fack.jpg
Type ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
0.4
ZERO API file : malware
VT API (file) 5 detected (Save, PwrSh, PowerShell, RunPE, CLASSIC)
md5 9cef89ec89411f062a8347f161ecab35
sha256 f355e1c426b13dfecaa3027998c282af56b603f8555280a50c821f20919bbbe4
ssdeep 1536:NG7MA34KtGjNnRm9aTpYlIgayfLyhmyORtjIPxplXCZInfLwbkSOW+69VuvIDiuK:3
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
notice File has been identified by 5 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure