Report - Invoke-PowerShellTcp.ps1

Generic Malware Antivirus
ScreenShot
Created 2023.09.19 17:44 Machine s1_win7_x6402
Filename Invoke-PowerShellTcp.ps1
Type ASCII text
AI Score Not founds Behavior Score
3.8
ZERO API file : clean
VT API (file) 29 detected (PowerShell, ReverseShell, HTool, Nishang, Hacktool, Save, Boxter, RemoteShell, Malicious, score, Zchl, PrivacyRisk, LFJB, Webshell, Detected, TOPIS, qe1CsWPSh5H, ai score=80)
md5 3fb164866fcea6e910934928d323fc4c
sha256 310e4d4c2d330b1a08221b67fe05f731379b9d916df0946d1698850bba2c5389
ssdeep 96:J+rbXHvonUsYqwLZvUqVn/0b37DMo6XBr4qIVCqiMP:Jyb3QCK+lo6XBEfVCqi6
imphash
impfuzzy
  Network IP location

Signature (7cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
info Command line console output was observed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key

Rules (2cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
72.142.102.153 CA ROGERS-COMMUNICATIONS 72.142.102.153 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure