Report - rt.php.ps1

NPKI Generic Malware Antivirus
ScreenShot
Created 2023.04.06 18:19 Machine s1_win7_x6402
Filename rt.php.ps1
Type ASCII text, with very long lines, with no line terminators
AI Score Not founds Behavior Score
2.0
ZERO API file : clean
VT API (file) 1 detected ()
md5 3227cac1eb494c82921cb69be4225f87
sha256 4fd0bcb2413d89915a6884aec025e5a1f1d1e1aa7d6647ede7aed5c7582552e3
ssdeep 49152:DAPwQ71DrNUWa58/8Xiyhb4TskKe35LAhF:z
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
watch A potential heapspray has been detected. 70 megabytes was sprayed onto the heap of the powershell.exe process
notice Allocates read-write-execute memory (usually to unpack itself)
notice File has been identified by one AntiVirus engine on VirusTotal as malicious
info Checks amount of memory in system
info Command line console output was observed
info Uses Windows APIs to generate a cryptographic key

Rules (3cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure