ScreenShot
Created | 2024.07.07 18:59 | Machine | s1_win7_x6403 |
Filename | SERVE.vbs | ||
Type | Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : mailcious | ||
VT API (file) | 7 detected (SAgent, Detected) | ||
md5 | 3c12d58060963c9a6190f3803d0bc6fe | ||
sha256 | 4f198a315660d497a105ae20dc821636e478e846e73bd8239d002aaa50530233 | ||
ssdeep | 768:LlzsS9vM9Tn4SixDSMi4ZFay4c+n2/0LKj1Ln80GmloZ:Llzs8aTn4SixDSqZFay4c+n2cLKxLn8X | ||
imphash | |||
impfuzzy |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
watch | Communicates with host for which no DNS query was performed |
watch | Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe |
watch | Wscript.exe initiated network communications indicative of a script based payload download |
watch | wscript.exe-based dropper (JScript |
notice | File has been identified by 7 AntiVirus engines on VirusTotal as malicious |
info | One or more processes crashed |
Rules (0cnts)
Level | Name | Description | Collection |
---|