Report - 1_update.ps1

Generic Malware Antivirus
ScreenShot
Created 2022.01.20 10:29 Machine s1_win7_x6402
Filename 1_update.ps1
Type ASCII text, with CRLF line terminators
AI Score Not founds Behavior Score
2.0
ZERO API file : clean
VT API (file) 12 detected (Boxter, PowerShell, ai score=82)
md5 6246ca1053e78ea3a0e2490a73a1fd4d
sha256 9729226cf4c02a1bec1afffe960c9a6d3316d5ce9e5b727993e9e888dadf1931
ssdeep 3:CwLXHPtwrWezJMkfVvtRm0oXas/JpHk/LBK73HgIpwPRE2J5xAIdedvgvn:CWyl5fVK0Kas/Js+pIi23fMlgvn
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
watch File has been identified by 12 AntiVirus engines on VirusTotal as malicious
watch The process powershell.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
info Command line console output was observed
info Uses Windows APIs to generate a cryptographic key

Rules (2cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure