Report - INV202054pdf.jar

ScreenShot
Created 2021.06.09 10:00 Machine s1_win7_x6401
Filename INV202054pdf.jar
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
2.0
ZERO API file : malware
VT API (file) 6 detected (Java, Kryptik, Eldorado, multiple detections, Siggen, Artemis, StrRat)
md5 fc43547ad34a9e4c3790e60a49fbc215
sha256 259fc2a6d3fdc25024b9b5d5257207d5e750b49f79e8b2914b89e8a9846a602b
ssdeep 1536:g2d34yLEzcPWTauSAtpxgF6NikUQIXY7wK8UmXp7JxlrXoaE1Hfisph/Mx5khW1g:gPOWTrR7PMkUfYkUa7jFXohiclMZg
imphash
impfuzzy
  Network IP location

Signature (4cnts)

Level Description
danger A potential heapspray has been detected. 901 megabytes was sprayed onto the heap of the java.exe process
notice Allocates read-write-execute memory (usually to unpack itself)
notice File has been identified by 6 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure