Report - Invoke-PowerShellTcp.ps1

Generic Malware Antivirus
ScreenShot
Created 2023.08.24 16:02 Machine s1_win7_x6401
Filename Invoke-PowerShellTcp.ps1
Type ASCII text
AI Score Not founds Behavior Score
3.8
ZERO API file : clean
VT API (file) 28 detected (Boxter, Hacktool, Save, Nishang, PowerShell, RemoteShell, Malicious, score, TOPIS, qe1CsWPSh5H, PrivacyRisk, LFJB, ReverseShell, ai score=86, HackScript, Detected, HTool)
md5 5661f942f86c50b5b845f675613bc1aa
sha256 3d125cab61a0706e93ddcec51032232e833e8998fcd14eca7892ae902e5174db
ssdeep 96:J+rbXHvonUsYqwLZvUqVn/0b37DMo6XBr4qIVCqiMn:Jyb3QCK+lo6XBEfVCqiO
imphash
impfuzzy
  Network IP location

Signature (7cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
info Command line console output was observed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key

Rules (2cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
35.174.153.211 US AMAZON-AES 35.174.153.211 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure