ScreenShot
Created | 2021.07.12 13:31 | Machine | s1_win7_x6402 |
Filename | 0071801_002710.js | ||
Type | HTML document, UTF-8 Unicode text, with very long lines, with CRLF line terminators | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 42 detected (Nemucod, Locky, Eldorado, ebzpxi, JSDldr, bcys, Dridex, Swabfex, ai score=81, TOPIS, IlnnDf94nMT) | ||
md5 | 3ed273cac81d6427c6682d8893bd43c2 | ||
sha256 | e7ba00fa12b128020fbcc841892cfcf0ac0ff481873e74eead4bec058cb7a8b4 | ||
ssdeep | 192:paj0puajXZX2xJkYINGHePxuYcDzvE2HpSoINiFh236OJizkoxG:8gp2UFOeP4Xw2JQMI3FJUG | ||
imphash | |||
impfuzzy |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 42 AntiVirus engines on VirusTotal as malicious |
watch | Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe |
watch | Wscript.exe initiated network communications indicative of a script based payload download |
watch | wscript.exe-based dropper (JScript |
Rules (0cnts)
Level | Name | Description | Collection |
---|