Report - RE_09JUKS74392048_pdf.wsf

ScreenShot
Created 2025.04.17 10:58 Machine s1_win7_x6401
Filename RE_09JUKS74392048_pdf.wsf
Type XML 1.0 document, ASCII text, with CRLF line terminators
AI Score Not founds Behavior Score
0.4
ZERO API
VT API (file) 4 detected (ABWW)
md5 6632b60dd38f1618b52fcbecc455ebf3
sha256 fdf01959dc38faf3428ddebec877f814c26e90eba4652341ede8b3608531ad53
ssdeep 12:TMHdCXS9brt4nU9S2sshMDiMFbzRW/U9v6uXtdMeq:2d193AU9S25hMDiIRW/U9v6u7Mp
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
notice File has been identified by 4 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure