Report - download2.php

ScreenShot
Created 2021.09.22 22:18 Machine s1_win7_x6401
Filename download2.php
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
1.0
ZERO API file : malware
VT API (file) 30 detected (AndroidOS, Hqwar, GenericKD, Android, AppRisk, Generisk, a variant of Android, Wskk, Andr, Dropr, BankBot, Artemis, hlxzd, Multiverze, Malicious, score, Marcher, Flubot)
md5 6e96da1afcb4f380b8a198f096ab70ab
sha256 1999431a84f10eea1ea0fcae0413ee7346d8c6f70d59451d0d88eba8b7a1d1e4
ssdeep 98304:nWr+nEb0Q5yAHVoinOO1kqF93WE5UyxrmJ:nJE4Q5hVFnp1vF9b5UyNmJ
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure