ScreenShot
Created | 2025.04.08 09:31 | Machine | s1_win7_x6401 |
Filename | Statements and Invoice 5400981237 PDF.vbs | ||
Type | ASCII text, with very long lines, with CRLF line terminators | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 9 detected (Malcode, gen114, a variant of Generik, IFKWAD, druvzi, Undefined, TOPIS, 7VNtCOvqy8T, Detected, 9LAI0Z) | ||
md5 | 18f42eda13f0234cbd82047e874d7823 | ||
sha256 | eecc41572a151dda472e639bd0546c0578dce1df78932ec331489f467f064dbb | ||
ssdeep | 48:vdicn0yTGmcWPWfghrbXi4Y02LZ7WHuLGVh5r22CmifdzzO7CwpvdRG+bucMAdIR:vdL3nPS4XiMpz5OkLHRG+bnZP3fcRV | ||
imphash | |||
impfuzzy |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
watch | Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe |
watch | Wscript.exe initiated network communications indicative of a script based payload download |
watch | wscript.exe-based dropper (JScript |
notice | File has been identified by 9 AntiVirus engines on VirusTotal as malicious |
notice | Performs some HTTP requests |
Rules (0cnts)
Level | Name | Description | Collection |
---|
Suricata ids
ET HUNTING TryCloudFlare Domain in TLS SNI
ET INFO Observed trycloudflare .com Domain in TLS SNI
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY Observed DNS Query to Commonly Abused Cloudflare Domain (trycloudflare .com)
ET INFO Observed trycloudflare .com Domain in TLS SNI
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY Observed DNS Query to Commonly Abused Cloudflare Domain (trycloudflare .com)