59fe169797953f2046b283235fe80158ebf02ba586eabfea306402fba8473dae
Code Red
2001
A worm targeting Microsoft IIS web servers.
#
Properties
mime type
application/octet-stream
size
3.9 kB
entropy
5.81445694
md5
6f5767...939120
sha1
4605a2...c6d002
sha256
59fe16...473dae
tlsh
b481c9...ae6b62
Internet Results
Malware analysis Net-Worm.zip Malicious activity | ANY.RUN ...
any.run
Mar 10, 2024
...
SHA256:
59FE169797953F2046B283235FE80158EBF02BA586EABFEA306402FBA8473DAE
. 3700, WinRAR.exe, C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm ...
Malware analysis Net-Worm.zip Malicious activity | ANY.RUN ...
any.run
Mar 16, 2024
...
SHA256:
59FE169797953F2046B283235FE80158EBF02BA586EABFEA306402FBA8473DAE
. 3992, WinRAR.exe, C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm ...
Visit Stairwell.com
K
♠
A
♠
ILOVEYOU
2
♠
Stuxnet
3
♠
WannaCry
4
♠
Conficker
5
♠
Flame
6
♠
Flame 2.0
7
♠
Duqu
8
♠
SolarWinds Supply Chain Attack
9
♠
BlackEnergy
10
♠
Regin
J
♠
Emotet
Q
♠
APT28/Sofacy
K
♠
Code Red
A
♥
SQL Slammer
2
♥
BlackPOS
3
♥
Operation Aurora
4
♥
Industroyer
5
♥
Sony Pictures Hack
6
♥
EternalBlue
7
♥
Ghost RAT
8
♥
FinFisher
9
♥
Mimikatz
10
♥
BonziBuddy
J
♥
Leaves
Q
♥
WEBC2
K
♥
NotPetya
A
♣
Zeus
2
♣
APT29/Cozy Bear
3
♣
Blaster
4
♣
Operation GhostNet
5
♣
APT32/OceanLotus
6
♣
HermeticWiper
7
♣
Mydoom
8
♣
DarkSide
9
♣
Cobalt Strike
10
♣
Mirai
J
♣
Dridex
Q
♣
Shamoon
K
♣
Operation Cleaver
A
♦
WarzoneRAT
2
♦
Akira
3
♦
Sandworm
4
♦
BlueKeep Exploit
5
♦
Remcos
6
♦
LockBit
7
♦
Moonlight Maze
8
♦
Agent.BTZ
9
♦
Chernobyl / CIH
10
♦
BadSector
J
♦
Michelangelo
Q
♦
Morris worm
K
♦
TrickBot
J
🃏︎
EICAR