ScreenShot
Created 2024.06.19 13:36 Machine s1_win7_x6403_us
Filename adobex.js
Type ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : clean
VT API (file) 21 detected (Cryxos, gen60, iacgm, Detected, Nemucod, ai score=89)
md5 52251be9db3c249a21b437db2186a21c
sha256 2a3e1c948716f57abd9b601a7dc01da40a34c0c1e3535fe4db5bb482dbc2e1c4
ssdeep 192:y7ArDZNNS8PqF7ZCT2xkwlSvsbO/VM0QPl0zDnL:SArDYYqaTS5cKeL
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
warning Generates some ICMP traffic
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
postutopia.net FR OVH SAS 51.254.27.105 mailcious
51.254.27.105 FR OVH SAS 51.254.27.105 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure