ScreenShot
Created | 2021.05.25 15:26 | Machine | s1_win7_x6402 |
Filename | ee.txt | ||
Type | ASCII text, with very long lines, with CRLF line terminators | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | |||
md5 | 4124e889a26b37658b95119b69bb8c39 | ||
sha256 | 62903fb8f176f352a3171fc845306f7a9a591a8096090a2fb66064840b8414ee | ||
ssdeep | 96:85oskvmU+u1ViXyzQX1f0gUe3X87J3aLQ4UtX4QLoBf/ETQjOfjjepUc/:Mosmmxuj0yzCWIn8oZUx7DMAjCpUc/ | ||
imphash | |||
impfuzzy |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
watch | Communicates with host for which no DNS query was performed |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Sends data using the HTTP POST Method |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | NPKI_Zero | File included NPKI | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (upload) |
Network (5cnts) ?
Suricata ids
ET HUNTING Suspicious HTTP POST to Free Web Host Atwebpages