-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathreport.json
92 lines (92 loc) · 2.17 KB
/
report.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
{
"Summary":
{
"Behavior":
[
"Identified as --- by Sandbox"
],
"Files":
[
{
"FileType": "0",
"Md5": "",
"Name": "",
"Processes":
[
{
"Name": "",
"RelType": "1",
"Sha256": ""
}
],
"Sha1": "",
"Sha256": ""
}
],
"JSONversion": "1.003",
"JobId": "89",
"MISversion": "4.14.0.7",
"OSversion": "win7sp1_x86",
"Process":
[
{
"Name": "",
"Reason": "loaded by MATD Analyzer",
"Severity": "-1"
}
],
"Processes":
[
{
"Name": ""
}
],
"SUMversion": "4.14.0.7",
"Selectors":
[
{
"Engine": "Gateway Anti-Malware",
"MalwareName": "---",
"Severity": "0"
},
{
"Engine": "Anti-Malware",
"MalwareName": "---",
"Severity": "0"
},
{
"Engine": "TIE File Reputation (ATD)",
"MalwareName": "---",
"Severity": "0"
},
{
"Engine": "Sandbox",
"MalwareName": "Malware.Dynamic",
"Severity": "-1"
}
],
"Stats":
[],
"Subject":
{
"FileType": "0",
"Name": "",
"Timestamp": "2022-01-26 10:55:39",
"Type": "PE32 executable (GUI) Intel 80386",
"md5": "",
"parent_archive": "Not Available",
"sha-1": "",
"sha-256": "",
"size": ""
},
"SubmitterName": "admin",
"SubmitterType": "STAND_ALONE",
"TaskId": "89",
"Verdict":
{
"Description": "",
"Severity": ""
},
"hasDynamicAnalysis": "true"
}
}