Report - 33per_.php.vbs

Generic Malware Antivirus Javascript_Blob OS Processor Check
ScreenShot
Created 2024.07.04 17:06 Machine s1_win7_x6403_us
Filename 33per_.php.vbs
Type UTF-8 Unicode text, with very long lines
AI Score Not founds Behavior Score
1.0
ZERO API file : clean
VT API (file)
md5 4c25e40bd05ca1c4c16ebeebb0133685
sha256 1d4d361633e698f0222d3c02b007833ffab5b100437e7f246b06f73b2f3c6018
ssdeep 49152:47h4zjCxb7qHlp4BOlN0KFhcuscyEMzYsm7++86mn3Ef/Vf7GI0/3qp6RCgScEQC:f
imphash
impfuzzy
  Network IP location

Signature (4cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Command line console output was observed
info Uses Windows APIs to generate a cryptographic key

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
notice Javascript_Blob use blob(Binary Large Objec) javascript binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure