ScreenShot
Created 2021.04.02 10:36 Machine s1_win7_x6401
Filename download
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name
AI Score Not founds Behavior Score
2.8
ZERO API file : mailcious
VT API (file) 29 detected (Abracadabra, QakBot, Save, ma29, Sneaky, Camelot, HIDDBOOK, SMTHA, Macro40, FCDQ, Malicious, score, ai score=82, Probably Heur, W97ShellB, Kryptik)
md5 22a66ab856e4814d425e6f6819a8fa77
sha256 2bfef3496a8434a5c9e519a532116b4ee23c730c5261d45ab7455fac7cab411f
ssdeep 6144:DcKoSsxzNDZLDZjlbR868O8Kfc03cKwh7uDphYHceXVhca+fMHLty/x2zZ89rOiY:6eLUIRfUI5uXL6nDJok
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pricer.civilta.in Unknown malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure