ScreenShot
Created 2021.05.26 17:48 Machine s1_win7_x6402
Filename edjpx01.zip
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
1.4
ZERO API file : clean
VT API (file) 22 detected (Cryxos, Save, FakeAlert, multiple detections, EvilCursor, Blocker, eizygn, V@7szps4, FakeAle, ai score=86, ASTVirus, TechSupportScam, TOPIS, RAGGD8TV1EO)
md5 78b7c12458b63f284b2b0b4386351ddd
sha256 42aff2180bc9658464741f715b0327e6428e02873de5414f146b08f2a6058ad8
ssdeep 24576:zwBkt9oUk3aiQdTyMnaps3Rx7beDY9B00p2B7AGNwfiW1W0ld74Dzq7A5ld74DzQ:bsaiQdTNapmxPgo0W2dAGNul+Dzq7A57
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure