ScreenShot
Created 2021.06.29 18:08 Machine s1_win7_x6401
Filename 1spga5.ico
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
0.4
ZERO API file : clean
VT API (file) 8 detected (Java, Adwind, FELI, Banload, MRAW, Malicious, score)
md5 d24f9baab815c7a3ff7968d843e6d1b9
sha256 d90b70a7edb41d5d5479a56f391fc999a276968e30e8efdacfc24f402efa4ad2
ssdeep 6144:uGM5z3DUIG7synUWuDmQFnqUMiw8DJkWm7Mt/xCWIIkKEJ+SsUTT:KtbgsynUhjVqUMiPDiAz0kSVTT
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
notice File has been identified by 8 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure