Indicator of Compromise Search
Bulk Lookup
✦ IPv4 Address ✦ Domain ✦ MD5/SHA1/SHA256 Hash ✦ URL
INDICATOR
48397e9052e99ec5678da7f904456e71
MD5 ⚠ 2 PULSE HITS
↓ CSV ↓ JSON
45
/100
MEDIUM
CONFIDENCE LEVEL
THREAT CONFIDENCE ANALYSIS
MEDIUM 45/100 confidence
Some evidence of suspicious activity. Further investigation recommended before action.
CLEAN LOW MED HIGH CRIT
0 25 50 75 100
OTX
10/30
2 pulses
VIRUSTOTAL
35/35
68/75 detected
ABUSEIPDB
/25
IPv4 only
URLHAUS
0/10
NOT LISTED
General Information
Hash48397e9052e99ec5678da7f904456e71
File TypeFileHash-MD5
AlienVault OTX Analysis ↗ View on OTX
2
PULSE HITS
Pulse Hits 2
Indicator Type MD5
Threat Level
ASSOCIATED PULSES
PULSE NAMEDATE
Operation BlockBuster unveils the actors behind the Sony attacks 2016-02-24
Operation BlockBuster unveils the actors behind the Sony attacks 2023-12-06
VirusTotal Analysis ↗ View on VirusTotal
68/75
DETECTIONS
MALICIOUS
Malicious 68
Suspicious 0
Harmless 0
Undetected 3
Reputation 0
File Name dev.js
File Type Win32 EXE
File Size 56.0 KB
TOP DETECTIONS
VENDORRESULT
ALYac Trojan.Agent.Brambul
APEX Malicious
AVG Win32:Agent-AOKX [Trj]
Acronis suspicious
Ad-Aware Trojan.Agent.ELPQ
AhnLab-V3 Trojan/Win32.Npkon.R1489
Alibaba Worm:Win32/Brambul.e7d2ae7e
Antiy-AVL Trojan[Spy]/Win32.Agent
Arcabit Trojan.Agent.ELPQ
Avast Win32:Agent-AOKX [Trj]
URLhaus (abuse.ch) ↗ View on URLhaus
✓ NOT LISTED No malicious activity found in URLhaus database.