All Detections - Detection Details - Related Analyzed File Information Parent topic

Information provided in the Related Analyzed File Information section of the Detection Details window may include the following:
  • Child files
    • File name
    • File size (bytes)
    • File type
    • File SHA-1
  • File name
  • File size
  • File type
  • File MD5
  • File SHA-1
  • File SHA-256
  • MITRE ATT&CK™ Framework
    • Tactics
    • Techniques
    Tip
    Tip
    Click the tactic or technique to view more details on the MITRE website.
    © ATT&CK™ is a trademark of the MITRE Corporation.
  • Threat
  • Virtual Analyzer risk level
YARA Detections
  • YARA Rule File
  • YARA Rules
Notable characteristics that are commonly associated with malware. Characteristics are grouped into the following categories:
  • Anti-security, self-preservation
  • Autostart or other system reconfiguration
  • Deception, social engineering
  • File drop, download, sharing, or replication
  • Hijack, redirection, or data theft
  • Malformation or other known malware traits
  • Process, service, or memory object change
  • Rootkit, cloaking
  • Suspicious network or messaging activity
  • Other notable characteristic