ScreenShot
Created | 2024.10.18 10:18 | Machine | s1_win7_x6403 |
Filename | malicious.jar | ||
Type | Java archive data (JAR) | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | |||
md5 | c72c38fe3b2eca106519f0e36ed2fa5c | ||
sha256 | e891f51be5147f7a7ac6e274b0fe5ca914c7b00aab005e30ac352c01f45d2d1b | ||
ssdeep | 24:9CCGtCtqdHXI7iXIj7nWELC0T8bTP9SYkjtJfV09MIvJZjvVeFIQ2xrUW:9CdtCYtU26rWEF0TPOjnN9SPQFIQ2xr3 | ||
imphash | |||
impfuzzy |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
info | Checks amount of memory in system |
info | One or more processes crashed |
Rules (1cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | zip_file_format | ZIP file format | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|