ScreenShot
Created 2025.04.23 10:28 Machine s1_win7_x6401
Filename a.html.vbs
Type UTF-8 Unicode text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
0.6
ZERO API file : clean
VT API (file) 7 detected (gen4, SAgent, PowerShell, Detected, AsyncRAT, Obfuscated)
md5 2a26cf0c1f30f2efe3c676dd4e2acb7b
sha256 ba5e61530cdea1183b503cfa8f7eaf6fcbde1d2db3b9286e42ee4c6c994d834f
ssdeep 384:fInta7SuHiBxwiwd1s+++z3DWAH6cMgHXFpErLvu5c9Qj6:gta7SuHiHwdcU6AH6xg3ofvu5cP
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
notice File has been identified by 7 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure