Indicator of Compromise Search
Bulk Lookup
✦ IPv4 Address ✦ Domain ✦ MD5/SHA1/SHA256 Hash ✦ URL
INDICATOR
b58fc37a7d9e1e75020a4c70af6b37595e2990af8e5f7abac26c0e961a2d301d
SHA256 ⚠ 5 PULSE HITS
↓ CSV ↓ JSON
55
/100
HIGH
CONFIDENCE LEVEL
THREAT CONFIDENCE ANALYSIS
HIGH 55/100 confidence
Strong evidence of malicious activity across multiple sources. Prioritise investigation.
CLEAN LOW MED HIGH CRIT
0 25 50 75 100
OTX
20/30
5 pulses
VIRUSTOTAL
35/35
65/76 detected
ABUSEIPDB
/25
IPv4 only
URLHAUS
0/10
NOT LISTED
General Information
Hashb58fc37a7d9e1e75020a4c70af6b37595e2990af8e5f7abac26c0e961a2d301d
File TypeFileHash-SHA256
AlienVault OTX Analysis ↗ View on OTX
5
PULSE HITS
Pulse Hits 5
Indicator Type SHA256
Threat Level
ASSOCIATED PULSES
PULSE NAMEDATE
Operation BlockBuster unveils the actors behind the Sony attacks 2016-02-24
Qakbot | Info Stealer | Sourced: Part-RU 2023-12-06
Operation BlockBuster unveils the actors behind the Sony attacks 2023-12-06
Qakbot | Info Stealer | Sourced: Part-RU 2023-10-01
Qakbot | Info Stealer | Sourced: Part-RU 2023-10-30
VirusTotal Analysis ↗ View on VirusTotal
65/76
DETECTIONS
MALICIOUS
Malicious 65
Suspicious 0
Harmless 0
Undetected 7
Reputation 0
File Name .bin
File Type Win32 EXE
File Size 84.0 KB
TOP DETECTIONS
VENDORRESULT
ALYac Trojan.Agent.Brambul
APEX Malicious
AVG Win32:Agent-AOKX [Trj]
Acronis suspicious
AhnLab-V3 Trojan/Win32.Npkon.R1489
Alibaba Worm:Win32/Brambul.dc81935a
Antiy-AVL Trojan/Win32.Lazarus
Arcabit Trojan.Agent.ELPQ
Avast Win32:Agent-AOKX [Trj]
Avira TR/Patched.Ren.Gen
URLhaus (abuse.ch) ↗ View on URLhaus
✓ NOT LISTED No malicious activity found in URLhaus database.