Report - 3RdYB0yFDbNXezPE.jpg

ScreenShot
Created 2021.07.09 18:36 Machine s1_win7_x6402
Filename 3RdYB0yFDbNXezPE.jpg
Type ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
1.0
ZERO API file : clean
VT API (file) 3 detected (ASync, PowerShell, CLASSIC)
md5 b08c1bc14e305a050747155ef13e14fe
sha256 57218d0c8c6a70d873ebd6f1b656b4bf51ce0741693ff733e18eff8ca4df38bf
ssdeep 12288:58vcOju3mvgZSriIm4N/SKf2zsJ3KKbBJpL7Lb+QQQQQVQSSSSSSSknhbN1F1kJv:avcOju3mvgZSriIm4N/SKf2zsJ3KKbBH
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
watch Communicates with host for which no DNS query was performed
notice File has been identified by 3 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
104.21.19.200 US CLOUDFLARENET 104.21.19.200 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure