MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6b38ac5b7be8f62d0e7645cdd3553ac86a06ccbbd6de9865f5bdf00bf62822e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 6b38ac5b7be8f62d0e7645cdd3553ac86a06ccbbd6de9865f5bdf00bf62822e6
SHA3-384 hash: 163f51b385027b97aa20253e415af1a79f2c3488e162dde92877b3a97e3c8dfe455bf489c6c904c8dc77c835bfa30076
SHA1 hash: fcd7d994da25cc401fbea536cbdbeb33ca8ed587
MD5 hash: 7605e5995aeece78fa5b454fd168eb31
humanhash: vermont-mars-video-oven
File name:6b38ac5b7be8f62d0e7645cdd3553ac86a06ccbbd6de9865f5bdf00bf62822e6.rtf
Download: download sample
File size:4'434 bytes
First seen:2020-05-26 04:40:31 UTC
Last seen:Never
File type:Rich Text Format (RTF) rtf
MIME type:text/rtf
ssdeep 96:Mwq4E1ikyScM1XuQiQujweIt/zMgee33PM1z0dAde:h81i9XM1KQn/w03/MKdAg
TLSH 40914CD48A6145D8C6CC96D81F253F8051B23BBCC7C3E8A9363C639A039767F266A4A0
Reporter JoulK
Tags:NanoCore

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Document-Word.Exploit.CVE-2017-11882
Status:
Malicious
First seen:
2020-05-26 01:34:58 UTC
File Type:
Document
Extracted files:
3
AV detection:
21 of 48 (43.75%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Launches Equation Editor
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
Enumerates system info in registry
Office loads VBA resources, possible macro or embedded object present
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Rich Text Format (RTF) rtf 6b38ac5b7be8f62d0e7645cdd3553ac86a06ccbbd6de9865f5bdf00bf62822e6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments