Report - sign_now.vbs

ScreenShot
Created 2024.06.11 14:43 Machine s1_win7_x6401
Filename sign_now.vbs
Type ASCII text, with very long lines
AI Score Not founds Behavior Score
1.8
ZERO API file : clean
VT API (file) 11 detected (gen60, VBSCRDLX, druvzi, Sabsik, Psyme)
md5 539544ea65b5ecdb757d49fd92cc335d
sha256 6b3f2e0c7ca1bdc6fb56035ec57ea39ef1f8b626bc5d99866fe00ba119357c8d
ssdeep 192:RYwRbYUTH0wDzAPXGTmAhY3tfHama0hY3rfTLbR26b:pbYUTH0vuKeS16maCSLTLbLb
imphash
impfuzzy
  Network IP location

Signature (3cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
www.python.org JP FASTLY 151.101.108.223 clean
146.75.48.223 Unknown 146.75.48.223 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure