ScreenShot
Created 2021.07.14 08:45 Machine s1_win7_x6402
Filename mad.zip
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
0.6
ZERO API file : clean
VT API (file) 19 detected (malicious, high confidence, GenericKD, Artemis, Racealer, Raccoon, PWSX, Static AI, Suspicious Archive, AgentTesla, LG7OQB, ai score=82, MachineLearning, Anomalous, 100%, susgen, PossibleThreat)
md5 2dd394b649d386e88e6d6da28be926d5
sha256 5f7eb7cc3478aea3ae9f539e8d1a86aa36e188f468f8dc0ddd596571ac82008e
ssdeep 6144:nswHvUg96JxHRqyjyFXs7flb4rf+ZFkDyAL2GQs7wiVHjj5LE2bUBH74L/3c:jF6JxH4jFclCmjmyZrFOjj62Ksjc
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure