ScreenShot
Created 2021.07.06 15:48 Machine s1_win7_x6401
Filename mod.jpg
Type gzip compressed data, last modified: Thu Jul 1 09:48:56 2021, from Unix
AI Score Not founds Behavior Score
1.0
ZERO API file : malware
VT API (file) 30 detected (Linux, BitCoinMiner, Multios, Coinminer, Miner, Save, Camelot, a variant of Linux, MALXMR, SMDSL64, Malicious, score, Elf64, hpbopl, jjaef, Tool, BtcMine, json, ai score=89, ASELF, Gen2, HackTool, MinerCfg, CLASSIC)
md5 bf32d6d01a0dd6802045e154b481175e
sha256 7695a56e0540a2600d9882cf9e504c1b25cadb2368bee8789afa53b5c4e74809
ssdeep 49152:z3jc9x0CtdVaPqKo8alWs3nz/OwcsskDRAtioLFg:z3oPdlaq98Zk2/kDRALFg
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure