MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 71bc707f557a7f7470219611c8525f11d96d1b4abdbd64d715aeeb323bcf0288. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SVCReady


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 71bc707f557a7f7470219611c8525f11d96d1b4abdbd64d715aeeb323bcf0288
SHA3-384 hash: 1f074c9673ac401b0bf58bd82164a07090c78fe1864473a5103e87492bb369a1b4d99a0b00a19d81a390bed731c35b17
SHA1 hash: c269a078c43351862518728d32fcb6b594ef2674
MD5 hash: 115e0cbcd2758f3da0aaba524d79eefc
humanhash: undress-alanine-green-burger
File name:TM8dLjizHspYEqJd.doc
Download: download sample
Signature SVCReady
File size:1'986'417 bytes
First seen:2022-06-08 20:12:40 UTC
Last seen:Never
File type:Word file doc
MIME type:application/zip
ssdeep 49152:SUVUBZurenW+LcD0OokTXxwlSZxD0XpHJ3Qw:5OH83tFTXxoSZxY1J3Qw
TLSH T1A39533A068A748BEC2C892367AA41ABE1C3D1395D25E4F3B51B541D8F5C6C13B4F2BC7
TrID 51.0% (.DOCX) Word Microsoft Office Open XML Format document (23500/1/4)
38.0% (.ZIP) Open Packaging Conventions container (17500/1/4)
8.6% (.ZIP) ZIP compressed archive (4000/1)
2.1% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter AndreGironda
Tags:doc SVCReady

Intelligence


File Origin
# of uploads :
1
# of downloads :
406
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive macros macros-on-open obfuscated reflection
Threat name:
Script-Macro.Trojan.Amphitryon
Status:
Malicious
First seen:
2022-06-08 17:15:00 UTC
File Type:
Document
Extracted files:
24
AV detection:
8 of 26 (30.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Drops file in Windows directory
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SVCReady

Word file doc 71bc707f557a7f7470219611c8525f11d96d1b4abdbd64d715aeeb323bcf0288

(this sample)

  
Dropping
win.svcready
  
Delivery method
Distributed via e-mail attachment

Comments