Report - 33per.php.vbs

Generic Malware Antivirus Javascript_Blob OS Processor Check
ScreenShot
Created 2024.07.04 17:04 Machine s1_win7_x6402
Filename 33per.php.vbs
Type UTF-8 Unicode text, with very long lines
AI Score Not founds Behavior Score
1.0
ZERO API file : clean
VT API (file)
md5 24fca6b85f37a8b4e0322e9a459a6251
sha256 dfd7b5ff3ee0e2887c68af32b40dac9448a95c88b44ac390d15d0013c502d7e7
ssdeep 49152:47h4zjCxb7qHlp4BOlN0KFhcuscyEMzYsm7++86mn3Ef/Vf7GI0/3qp6RCgScEQ4:H
imphash
impfuzzy
  Network IP location

Signature (4cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Command line console output was observed
info Uses Windows APIs to generate a cryptographic key

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
notice Javascript_Blob use blob(Binary Large Objec) javascript binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure