ScreenShot
Created 2021.04.02 10:19 Machine s1_win7_x6401
Filename last.sct
Type XML document, ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
0.6
ZERO API file : clean
VT API (file) 13 detected (MulDrop16, Squiblydoo, iacgm, Crypted, Malicious, score, CLASSIC)
md5 a1269f636a62fc84b85d508244db0db5
sha256 5f882673acf6904107474737500719231506c8b36ed70090011cb89aeb386de0
ssdeep 6144:L/ZFcC7dZtk5QEYLI0qtpvv0pasJcxsxA5FXbPu7XI0iJr:bZFcCh9xRqXHsssxA5FLv0i1
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
watch File has been identified by 13 AntiVirus engines on VirusTotal as malicious

Rules (1cnts)

Level Name Description Collection
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure