MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54f75ad8604c45b4e8798d60074ae7595ec8599fee61ed01cb0e34db23e41bde. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 54f75ad8604c45b4e8798d60074ae7595ec8599fee61ed01cb0e34db23e41bde
SHA3-384 hash: 6e36558f206580477b670930369f04f175ea67329b31f72177b981eb3794d957826abc2a1f12cf673fcfbb79a85dbcaa
SHA1 hash: b0a66c16032cd69dbe48f18a82165e00ed388bf0
MD5 hash: 73cf6c85b0eb4086ddbdcded4170d5ef
humanhash: yankee-mobile-diet-cola
File name:SecuriteInfo.com.X97M.DownLoader.2343.19887.9010
Download: download sample
File size:1'554'944 bytes
First seen:2026-05-15 16:23:10 UTC
Last seen:2026-05-15 17:18:58 UTC
File type:Excel file xlsx
MIME type:application/vnd.ms-excel
ssdeep 24576:34+mq4sV1ADKP1Pu1+6KuaKTB2gvZE1VsQX8ibhii+/ffMAIGenyAgJl:tmJCWCCwYTB2gSIQBbmfMAIGky5
TLSH T19075E01798488B96D55D42B4AE070C992F496E0CA8C17AEF306F7E8B3F747720D5E12E
TrID 34.9% (.XLS) Microsoft Excel sheet (32500/1/3)
30.1% (.XLS) Microsoft Excel sheet (alternate) (28000/1/3)
26.3% (.XLS) Microsoft Excel sheet (alternate) (24500/1/2)
8.6% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika xls
Reporter SecuriteInfoCom
Tags:xlsx

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE dump

MalwareBazaar was able to identify 18 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
2244 bytesDocumentSummaryInformation
3200 bytesSummaryInformation
499 bytesMBD0013D700/CompObj
5683173 bytesMBD0013D700/Package
694 bytesMBD0013D701/CompObj
720 bytesMBD0013D701/Ole
8749377 bytesMBD0013D701/CONTENTS
9690 bytesMBD0013D702/Ole
1094922 bytesWorkbook
11529 bytes_VBA_PROJECT_CUR/PROJECT
12104 bytes_VBA_PROJECT_CUR/PROJECTwm
13977 bytes_VBA_PROJECT_CUR/VBA/Sheet1
14977 bytes_VBA_PROJECT_CUR/VBA/Sheet2
15977 bytes_VBA_PROJECT_CUR/VBA/Sheet3
16985 bytes_VBA_PROJECT_CUR/VBA/ThisWorkbook
172644 bytes_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
18553 bytes_VBA_PROJECT_CUR/VBA/dir

Intelligence


File Origin
# of uploads :
2
# of downloads :
89
Origin country :
FR FR
Vendor Threat Intelligence
Malware configuration found for:
MSO
Details
MSO
extracted VBA Macros and, if observed, MS-OFORM variables/data are added to the knowledge base for usage in later parsing of the Macros
Malware family:
n/a
ID:
1
File name:
xlsx
Verdict:
No threats detected
Analysis date:
2026-05-15 16:26:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Legit
File type:
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
Has a screenshot:
False
Contains macros:
False
Verdict:
Malicious
Score:
99.1%
Tags:
macro micro x97m
Result
Verdict:
Malicious
File Type:
Legacy Excel File with Macro
Behaviour
SuspiciousRTF detected
Document image
Document image
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
macros
Label:
Malicious
Suspicious Score:
10/10
Score Malicious:
1%
Score Benign:
0%
Verdict:
Malicious
File Type:
xls
First seen:
2026-05-06T04:54:00Z UTC
Last seen:
2026-05-15T12:05:00Z UTC
Hits:
~10000
Gathering data
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2026-05-06 13:12:53 UTC
File Type:
Document
Extracted files:
101
AV detection:
17 of 36 (47.22%)
Threat level:
  5/5
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:informational_win_ole_protected
Author:Jeff White (karttoon@gmail.com) @noottrak
Description:Identify OLE Project protection within documents.
Rule name:XLS_STRINGS
Author:somedieyoungZZ
Description:Detect Strings targeting Bangladesh

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments