Summary | ZeroBOX

last.sct

Category Machine Started Completed
FILE s1_win7_x6401 April 2, 2021, 10:17 a.m. April 2, 2021, 10:19 a.m.
Size 298.5KB
Type XML document, ASCII text, with very long lines, with CRLF line terminators
MD5 a1269f636a62fc84b85d508244db0db5
SHA256 5f882673acf6904107474737500719231506c8b36ed70090011cb89aeb386de0
CRC32 E7BF0F0B
ssdeep 6144:L/ZFcC7dZtk5QEYLI0qtpvv0pasJcxsxA5FXbPu7XI0iJr:bZFcCh9xRqXHsssxA5FLv0i1
Yara
  • anti_vm_detect - Possibly employs anti-virtualization techniques

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

DrWeb Trojan.MulDrop16.37703
ESET-NOD32 JS/TrojanDropper.Agent.OFU
ClamAV Xml.Malware.Squiblydoo-6728833-0
Kaspersky HEUR:Trojan.Script.Generic
NANO-Antivirus Trojan.Script.Heuristic-js.iacgm
F-Secure Malware.HTML/Crypted.Gen
Baidu VBS.Trojan-Dropper.Agent.ap
McAfee-GW-Edition BehavesLike.HTML.Dropper.dr
Avira HTML/Crypted.Gen
Microsoft Exploit:Win32/ShellCode!ml
ZoneAlarm HEUR:Trojan.Script.Generic
Cynet Malicious (score: 85)
Rising Dropper.Agent/JS!1.D49D (CLASSIC)