ssh.exe
- File Path:
C:\Users\user\AppData\Local\GitHubDesktop\app-2.5.4\resources\app\git\usr\bin\ssh.exe
Hashes
Type | Hash |
---|---|
MD5 | AEB831AFB7C62F95881BB1A657B31A87 |
SHA1 | 164A5EDF43E62ACE4BC45933256E62AFC950A259 |
SHA256 | 937F3317FAD790C1F3980CB12B31CA6D000698AB99E31839F1CFEC575E4193B7 |
SHA384 | 1FA26EAB97DB6DCEB9B371FED199C0E22457D0839784A5B4AE01A9CF1A614199FFAA6FBCF62CE14B35F3406DDE74680D |
SHA512 | 9EAC505C9159A74FC499F80082C905C6063200AD15C694D1F42D50CC9ACD0F81A84535DD28BEDB06D942E7D18B367D20BA805E50DC6363FF6AD68AF1BD2BDBC5 |
SSDEEP | 12288:XeE4ifbr/+wuWTqZXOF3UGMmCONFzS7ifsSZSJ:XZ4i2wiZ+Fam9FzS7ifsSZSJ |
Runtime Data
Usage (stderr):
ssh: unknown option -- h
usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface]
[-b bind_address] [-c cipher_spec] [-D [bind_address:]port]
[-E log_file] [-e escape_char] [-F configfile] [-I pkcs11]
[-i identity_file] [-J [user@]host[:port]] [-L address]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
[-Q query_option] [-R address] [-S ctl_path] [-W host:port]
[-w local_tun[:remote_tun]] destination [command]
Child Processes:
conhost.exe
Loaded Modules:
Path |
---|
C:\Users\user\AppData\Local\GitHubDesktop\app-2.5.4\resources\app\git\usr\bin\ssh.exe |
C:\Windows\System32\KERNEL32.DLL |
C:\Windows\System32\KERNELBASE.dll |
C:\Windows\SYSTEM32\ntdll.dll |
Signature
- Status: Signature verified.
- Serial:
045D8F14A82147641722D4FAFC66BC80
- Thumbprint:
FB713A60A7FA79DFC03CB301CA05D4E8C1BDD431
- Issuer: CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Subject: CN=”GitHub, Inc.”, O=”GitHub, Inc.”, L=San Francisco, S=California, C=US
File Metadata
- Original Filename:
- Product Name:
- Company Name:
- File Version:
- Product Version:
- Language:
- Legal Copyright:
Possible Misuse
The following table contains possible examples of ssh.exe
being misused. While ssh.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proc_creation_win_multiple_suspicious_cli.yml | - ssh.exe |
DRL 1.0 |
MIT License. Copyright (c) 2020-2021 Strontic.