ScreenShot
Created 2021.09.25 10:57 Machine s1_win7_x6402
Filename 9yub0of.ico
Type Java archive data (JAR)
AI Score Not founds Behavior Score
0.4
ZERO API file : malware
VT API (file) 3 detected (Java, Kryptik, Eldorado, Malicious, score)
md5 b154189e0bcbf2556452a4d510d7043f
sha256 e43cabff1884efdedfc047defe289af6aaa42327ef72c5bd0b3289c3260c19c9
ssdeep 6144:qEyNkjNKbhFTAK0CY/bw0OV4+q8fAIau9qF:VjNK9R0CY/bw/4+yIvS
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
notice File has been identified by 3 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure