ScreenShot
Created 2023.06.21 07:39 Machine s1_win7_x6401
Filename thomas.hta
Type HTML document, ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
1.0
ZERO API file : clean
VT API (file) 25 detected (GenericKD, Electryon, ABRisk, UWSW, Kryptik, Dinihou, dnzdga, Dkjl, Amadey, Malware@#8xsx5wsmqb2b, Detected, suspected of VBS, EncodedMalware, TOPIS, vWsVDvvsRgD, ai score=88)
md5 5ee0717be491e47a97affc5d4bc8d206
sha256 6c2823c8c32e25f2bd3b363460fd2a45e49da6bb683c9de58f1ba30fb71812f9
ssdeep 768:jaaYhlmBrbO/HdofLAH7HkRYoYfDt5ELy6NpjdkhYVd9:jv0lmZO/9oTWEKoYfDt5EWaZykd9
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure