Report - NmX.txt.html

VBScript PowerShell Obfuscated File
ScreenShot
Created 2021.05.31 11:15 Machine s1_win7_x6401
Filename NmX.txt.html
Type HTML document, ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
0.8
ZERO API file : mailcious
VT API (file) 17 detected (Zephyr, gen76, PowerShell, Obfuscated, TOPIS, ZshxSFSlAAP, ai score=85)
md5 f69a35821e442a111ebbe08c7fc22060
sha256 3079add2c79875b8bc3a7f9c7ab578243a32fd11201744f3d41aaf862e3e9a7c
ssdeep 12:kf6Qclfh3D5LW+63cFIA0Aj29meCXGCE0YSMM+Cq7MMVautsrBYMSeN:kfsp1C+63kU/saC4SMMs7MMEFYMdN
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
watch File has been identified by 17 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (1cnts)

Level Name Description Collection
danger VBScript_PowerShell_Obfuscated_Zero VBScript PowerShell Obfuscated File binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure