ScreenShot
Created | 2022.12.20 18:27 | Machine | s1_win7_x6402 |
Filename | product.doc | ||
Type | Rich Text Format data, version 1, unknown character set | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 14 detected (CVE-2017-1188, CVE-2018-0802, CVE-2018-0798, CVE-2020-1711, CVE201711882, RTFDl, Detected, RTFObfustream, Probably Heur, RTFObfuscation) | ||
md5 | 47c1af8dc03fcf167b2e2909fa0fecd6 | ||
sha256 | a21b87dee98e9551ca59d5532c9abfd900809a060f22e69aa62e0b493ed9b65b | ||
ssdeep | 768:7Fx0XaIsnPRIa4fwJMgosJ71i3+m4F9tjvE:7f0Xvx3EMJh3+m6Z8 | ||
imphash | |||
impfuzzy |
Network IP location
Signature (8cnts)
Level | Description |
---|---|
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
watch | Communicates with host for which no DNS query was performed |
watch | File has been identified by 14 AntiVirus engines on VirusTotal as malicious |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Creates (office) documents on the filesystem |
notice | Creates hidden or system file |
notice | RTF file has an unknown character set |
info | One or more processes crashed |
Rules (1cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | Rich_Text_Format_Zero | Rich Text Format Signature Zero | binaries (upload) |