ssh.exe
- File Path:
C:\Users\user\AppData\Local\GitHubDesktop\app-2.5.3\resources\app\git\usr\bin\ssh.exe
Hashes
Type | Hash |
---|---|
MD5 | 4E719BBBF76C12C2A036F17077BA10AB |
SHA1 | 352CBD32805CABBDE41BE8BFA1FD83FE26B54BFB |
SHA256 | 4C259BBBB1AB6C554C4AC65218740590B71603306D92552BDA41C951E5A6A962 |
SHA384 | 0278298439B282BAA7C1F55BE9C8CB46FE18EEC46B3FF60A54089027028E13BC7DC3D33A1D4D2EADF55D57E57A1776D8 |
SHA512 | 48B407C39A1191CCAF692FE7C945021A571542B78C82152B9D4508710B55645911765FB2099F303C5BEDC19069AB136E6BE11D113707C9037814FB901F79D526 |
SSDEEP | 12288:GofjwKtpqCKrsKlgHCN79iHIBicblekIaZvg4fslSw:GMRtpqbaCT0aXpIaZvg4fslSw |
Runtime Data
Usage (stderr):
ssh: unknown option -- h
usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface]
[-b bind_address] [-c cipher_spec] [-D [bind_address:]port]
[-E log_file] [-e escape_char] [-F configfile] [-I pkcs11]
[-i identity_file] [-J [user@]host[:port]] [-L address]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
[-Q query_option] [-R address] [-S ctl_path] [-W host:port]
[-w local_tun[:remote_tun]] destination [command]
Child Processes:
conhost.exe
Signature
- Status: Signature verified.
- Serial:
045D8F14A82147641722D4FAFC66BC80
- Thumbprint:
FB713A60A7FA79DFC03CB301CA05D4E8C1BDD431
- Issuer: CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Subject: CN=”GitHub, Inc.”, O=”GitHub, Inc.”, L=San Francisco, S=California, C=US
File Metadata
- Original Filename:
- Product Name:
- Company Name:
- File Version:
- Product Version:
- Language:
- Legal Copyright:
Possible Misuse
The following table contains possible examples of ssh.exe
being misused. While ssh.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proc_creation_win_multiple_suspicious_cli.yml | - ssh.exe |
DRL 1.0 |
MIT License. Copyright (c) 2020-2021 Strontic.