Report - getfile.php

ZIP Format
ScreenShot
Created 2024.05.18 20:06 Machine s1_win7_x6403
Filename getfile.php
Type Zip archive data
AI Score Not founds Behavior Score
0.6
ZERO API file : clean
VT API (file) 19 detected (Malicious, score, a variant of Android, Android, Ermac, Bank, AndroidOS, Ermak, General, Sake, IBGO, BankBot, origin, Andr, Xgen2, Detected)
md5 28c1720427cbbd5358a817b609301c7b
sha256 62b51a131747e8e416bedef0fd3c32cef055e33ba8225f6c174951c8b14fbc47
ssdeep 49152:ZLYhvMfJpLF2fjvKwux2Qot8J3fXE469WZmEk/Xx3g/44:ShveF27VO2Qot8/6wZmEuXj4
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious

Rules (1cnts)

Level Name Description Collection
info zip_file_format ZIP file format binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure