Report - bypassBS.txt.ps1

Generic Malware Antivirus
ScreenShot
Created 2021.10.02 17:13 Machine s1_win7_x6403
Filename bypassBS.txt.ps1
Type ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
1.0
ZERO API file : mailcious
VT API (file)
md5 8a48841ba0eaab6ba03a71bb9aa7c0e3
sha256 8ce72ef22b3162a2aadd6d11ed1bcc28005583ef15d9476745cf6b58595e868c
ssdeep 192:IWAmV4Y8fE5wKOU9WP4N6Mp4+OuPAw8q/SIQIA7Zc:IWAmVSfECUCMEPp7Zc
imphash
impfuzzy
  Network IP location

Signature (4cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Command line console output was observed
info Uses Windows APIs to generate a cryptographic key

Rules (2cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure