ScreenShot
Created | 2024.05.17 10:12 | Machine | s1_win7_x6401 |
Filename | ttt.hta | ||
Type | HTML document, ASCII text, with CRLF line terminators | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 23 detected (Valyria, Kimsuky, 0NA104EE24, SLoad, TOPIS, 3BSGVFy9i7O, Malgent, Running, ai score=81) | ||
md5 | b5080c0d123ce430f1e28c370a0fa18b | ||
sha256 | b3ab0b19478336a8c17ee9fd28ab6463df206b23f69c7e3b5eacc3efb11a0a95 | ||
ssdeep | 48:l4f/6SpKMucAjeYqgt40qPH5qs+X4h8+rda88Zjz:jSVAhtWntMjz | ||
imphash | |||
impfuzzy |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
warning | File has been identified by 23 AntiVirus engines on VirusTotal as malicious |
watch | Disables proxy possibly for traffic interception |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
info | Checks amount of memory in system |
info | Queries for the computername |
Rules (0cnts)
Level | Name | Description | Collection |
---|