MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38912beea95850b26832e4656aeb0c1ea041350b15ce11e48dc6b67996bf9756. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 38912beea95850b26832e4656aeb0c1ea041350b15ce11e48dc6b67996bf9756
SHA3-384 hash: 96bf254c24364771ec700705b64676fe8b0c0a2a41a46cf2442879bd2bcc2a2b039fd35bf0200bbea1c9bc38dae7eade
SHA1 hash: 4886efe240a120216ab07c8a2cba08314e6b6852
MD5 hash: 018924edcb842c093e6aced0b2383f4f
humanhash: magazine-fix-washington-juliet
File name:rsuas.rtf
Download: download sample
File size:3'997'204 bytes
First seen:2026-04-01 17:19:48 UTC
Last seen:Never
File type:Rich Text Format (RTF) rtf
MIME type:text/rtf
ssdeep 12288:DmnUHOnAnmnUHOnA7CzV7Iplm0l/zkLNPms2Ei:Kn4UAmn4UA7CzV7Iplm0l/zYmx
TLSH T17A0630949EF16700F2D682FAA19BB58CED2E7C2234D9CAC8797FD4B464C1D21FE08546
TrID 83.3% (.RTF) Rich Text Format (5000/1)
16.6% (.JSON) JSON object (generic) (1000/1)
Magika rtf
Reporter JAMESWT_WT
Tags:CVE-2017-11882 NKFZ5966PURCHASE rtf

Intelligence


File Origin
# of uploads :
1
# of downloads :
51
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
_6ad6c38552304b963d6a53e77078c6741cbebf52e758716c470be92c79805cb4.zip
Verdict:
No threats detected
Analysis date:
2026-03-30 07:07:56 UTC
Tags:
arch-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Legit
File type:
application/rtf
Has a screenshot:
False
Contains macros:
False
Verdict:
Malicious
Score:
90.2%
Tags:
shell sage remo
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a window
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Creating a process with a hidden window
Possible injection to a system process
Creating a process from a recently created file
Result
Verdict:
Malicious
File Type:
RTF File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
File Type:
rtf
First seen:
2026-03-29T22:31:00Z UTC
Last seen:
2026-04-03T13:55:00Z UTC
Hits:
~1000
Detections:
Trojan.JS.SAgent.sb Trojan.MSOffice.SAgent.sb Trojan.MSOffice.Agent.sb HEUR:Trojan.Script.Generic Exploit.MSOffice.CVE-2017-11882.sb PDM:Trojan.Win32.Generic HEUR:Exploit.Win32.CVE-2017-11882.a HEUR:Exploit.MSOffice.Generic HEUR:Exploit.MSOffice.CVE-2017-11882.b Trojan-Downloader.Win32.PsDownload.sb HEUR:Trojan.Script.SAgent.gen HEUR:Trojan-Downloader.Script.Generic Exploit.MSOffice.CVE-2018-0802.b
Verdict:
Malicious
Threat:
Exploit.MSOffice.CVE-2017-11882
Threat name:
Document-RTF.Exploit.CVE-2017-11882
Status:
Malicious
First seen:
2026-03-30 01:08:02 UTC
File Type:
Document
Extracted files:
41
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
NTFS ADS
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:SUSP_INDICATOR_RTF_MalVer_Objects
Author:ditekSHen
Description:Detects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents.
Reference:https://github.com/ditekshen/detection

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments