ScreenShot
Created | 2024.04.08 18:28 | Machine | s1_win7_x6403 |
Filename | tfr.exe | ||
Type | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 44 detected (AIDetectMalware, AsyncRAT, malicious, high confidence, score, Artemis, MSILZilla, unsafe, Vdn1, Attribute, HighConfidence, GenKryptik, AGen, FileRepMalware, Misc, Redcap, mcrsk, Detected, ai score=80, ABRisk, KJRG, Static AI, Suspicious PE, PossibleThreat, confidence, 100%) | ||
md5 | ad429013c23fece896d44024860b06b8 | ||
sha256 | 21eaa68eee2d10f0969cc35235409dfb199b2e8465e65711dcad9d854b1d9034 | ||
ssdeep | 6144:qI2YQe7GwutkgEF+b3NnOkKcsHFkvcuaL4+:qI2leqwIk1F+b9JKZHyvFaL4+ | ||
imphash | |||
impfuzzy | 3:: |
Network IP location
Signature (1cnts)
Level | Description |
---|---|
danger | File has been identified by 44 AntiVirus engines on VirusTotal as malicious |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) is none
EAT(Export Address Table) is none
EAT(Export Address Table) is none