ScreenShot
Created | 2024.07.03 19:02 | Machine | s1_win7_x6401 |
Filename | file_ahstznsa.ob0.txt.ps1 | ||
Type | UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 9 detected (Boxter, CLASSIC, ai score=83) | ||
md5 | 478b1ac88592f59f8a1d4cb790120c38 | ||
sha256 | 3aad96ae8257170d413eb6965ecb7bb167040176d07f52f69ba8df9f2e534605 | ||
ssdeep | 24:QRjMpzlw2FnVHLw1PkXDlu+OjK8vGTdvVTxdFw//vOvyC2/BP:6I9V01uw+GdvGRNTfC//vcyC25 | ||
imphash | |||
impfuzzy |
Network IP location
Signature (9cnts)
Level | Description |
---|---|
watch | Network communications indicative of a potential document or script payload download was initiated by the process powershell.exe |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | File has been identified by 9 AntiVirus engines on VirusTotal as malicious |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Poweshell is sending data to a remote host |
notice | URL downloaded by powershell script |
info | Queries for the computername |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
Suricata ids
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)