MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 77c88222a44c9c1c04c1198da8803e2238062f8a4624768e96ff03e9608921e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 77c88222a44c9c1c04c1198da8803e2238062f8a4624768e96ff03e9608921e2
SHA3-384 hash: 4f3454f4b41be855f1064e187dd5e08bd74fdc64a926b3671e8c287905cbc0b6fc3d7ab2b9a825ec96524ff9d0d146e5
SHA1 hash: d287319ff8781e399489b083ad69152db87b78fb
MD5 hash: a16012041fbe6c3545acc400fa934f3d
humanhash: lemon-ink-alabama-oven
File name:SecuriteInfo.com.Trojan.GenericKD.46081702.29616.14492
Download: download sample
File size:65'024 bytes
First seen:2021-04-12 23:40:20 UTC
Last seen:Never
File type:PowerPoint file ppt
MIME type:application/vnd.ms-powerpoint
ssdeep 384:t9wmDkQdELAcwIpXrLvjAls0I3xuw1rR:TAtnpXrLv0ls7Buw1r
TLSH 4E538016B757C9A3D1596A358EE2D6CB3331BC22BD81930F318A332F2E379509E42B45
Reporter SecuriteInfoCom

Intelligence


File Origin
# of uploads :
1
# of downloads :
162
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Proforma Inv for INV-00642.ppt
Verdict:
No threats detected
Analysis date:
2021-04-12 15:24:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Result
Verdict:
Malicious
File Type:
Legacy PowerPoint File with Macro
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Document contains an embedded VBA macro which may execute processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Document-Office.Trojan.Valyria
Status:
Malicious
First seen:
2021-04-12 09:02:10 UTC
AV detection:
12 of 47 (25.53%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro xlm
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments