ScreenShot
Created 2023.10.17 10:04 Machine s1_win7_x6403
Filename 2
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
0.6
ZERO API file : clean
VT API (file) 12 detected (GenericFCA, Artemis, probably a variant of Win32, AFUG, ai score=84)
md5 aed1eb4ab37c9eac1b1108d9739f5903
sha256 27de717659d220f0d89d5efd487c3b7383a8873af3dbc870d72fe2bae6f157df
ssdeep 3072:KV5ghImOLzHHcTzmK80URMQ+D3ityYiuEB753xm:KV5o8LHcd8bMdD3iwuy75c
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
watch File has been identified by 12 AntiVirus engines on VirusTotal as malicious

Rules (1cnts)

Level Name Description Collection
info zip_file_format ZIP file format binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure