Report - Remittance%20E-MAIL%20Layout%20-%2011_.jar

ScreenShot
Created 2021.05.11 10:52 Machine s1_win7_x6402
Filename Remittance%20E-MAIL%20Layout%20-%2011_.jar
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
3.0
ZERO API file : malware
VT API (file) 20 detected (Java, Siggen, Kryptik, Eldorado, a variant of Java, ilyda, ai score=81, Malicious, score)
md5 9b6d479272935796ca92e0a610c8ae45
sha256 7bd29b61cdc2bbcdb2ba87ed9f103bba116eda52a53030242bc74742429ab494
ssdeep 1536:E0m2TVXUMPQi92GDrnIJvDbprCX6Qal36JvYtgMWsI8xvHueGCRaGy/cbiio/7Vg:tTVdMcOxCKGJvY0IxWeGCRviZr5g
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
danger A potential heapspray has been detected. 855 megabytes was sprayed onto the heap of the java.exe process
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure