Report - download.php

ScreenShot
Created 2021.09.22 22:42 Machine s1_win7_x6402
Filename download.php
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
0.8
ZERO API file : malware
VT API (file) 25 detected (GenericKD, Android, Hqwar, AdLibrary, Generisk, a variant of Android, AndroidOS, BankBot, Artemis, Andr, Dropr, Flubot, Marcher, Dyfi, ai score=84)
md5 f00246dd362f2c57a69b82099bf4e4ea
sha256 24dd0431722ac6c8ddd8a4260f60ce0d41063d58656590c249c65e8f075e22d6
ssdeep 98304:wwnD+xd63NmDrRCe/xC9KWsAyxr07JlK1pSecoPipV1FOt:wOD+xd63NmDrRCeRwyN07JY1IvVpV1g
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure