ScreenShot
Created | 2021.05.11 10:52 | Machine | s1_win7_x6402 |
Filename | Remittance%20E-MAIL%20Layout%20-%2011_.jar | ||
Type | Zip archive data, at least v2.0 to extract | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 20 detected (Java, Siggen, Kryptik, Eldorado, a variant of Java, ilyda, ai score=81, Malicious, score) | ||
md5 | 9b6d479272935796ca92e0a610c8ae45 | ||
sha256 | 7bd29b61cdc2bbcdb2ba87ed9f103bba116eda52a53030242bc74742429ab494 | ||
ssdeep | 1536:E0m2TVXUMPQi92GDrnIJvDbprCX6Qal36JvYtgMWsI8xvHueGCRaGy/cbiio/7Vg:tTVdMcOxCKGJvY0IxWeGCRviZr5g | ||
imphash | |||
impfuzzy |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
danger | A potential heapspray has been detected. 855 megabytes was sprayed onto the heap of the java.exe process |
warning | File has been identified by 20 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
notice | Allocates read-write-execute memory (usually to unpack itself) |
info | Checks amount of memory in system |
Rules (0cnts)
Level | Name | Description | Collection |
---|
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|