MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 904f69a4bed3844273cce1676e8920794815af4c1527e560bbc1bc44b5b8457a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 904f69a4bed3844273cce1676e8920794815af4c1527e560bbc1bc44b5b8457a
SHA3-384 hash: baa8b70f3d0c5f026c167697c3dc766b8878f3d65de05a2ea0aa72b4f20f11995014a3d9de5743dd264448bf5d75af36
SHA1 hash: 89236d9795f1e8db7d895d0e364dd4768ebc6410
MD5 hash: fba1fd894b9201a11e866ba58c80ae61
humanhash: river-may-arkansas-pizza
File name:OfficeConsultPlugin.exe
Download: download sample
File size:1'501'600 bytes
First seen:2021-04-08 07:52:52 UTC
Last seen:2021-04-12 17:19:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e9c0657252137ac61c1eeeba4c021000 (53 x GuLoader, 26 x RedLineStealer, 17 x AgentTesla)
ssdeep 24576:vdHmODmYHSmdLMB80i8olWKuoDoDNV4DmF60sBpJ8lyvb+Y:vtbSm1MJoFDoDoSFQJAobZ
Threatray 5 similar samples on MalwareBazaar
TLSH 946502823185DCDBE04329F208AFD52065B87D9E8165C90E3747BB2BA4E735324AF75E
Reporter ankit_anubhav

Intelligence


File Origin
# of uploads :
3
# of downloads :
113
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
mal.docm
Verdict:
Malicious activity
Analysis date:
2021-04-08 07:47:05 UTC
Tags:
macros macros-on-open generated-doc loader buerloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %AppData% subdirectories
Creating a file in the %AppData% directory
Creating a file in the %temp% subdirectories
Unauthorized injection to a recently created process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
76 / 100
Signature
Contains functionality to behave differently if execute on a Russian/Kazak computer
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Enumerates connected drives
Loads dropped DLL
Unpacked files
SH256 hash:
dba1ba12eb971b71b0d9a216b771e0161cd2311633e6e9a6fd1a17dc2127cbf0
MD5 hash:
0d496c67d24eac015dd7ab2e4cbacd0b
SHA1 hash:
951b043d2f327889bff93258c22dffd99bc2a45c
SH256 hash:
904f69a4bed3844273cce1676e8920794815af4c1527e560bbc1bc44b5b8457a
MD5 hash:
fba1fd894b9201a11e866ba58c80ae61
SHA1 hash:
89236d9795f1e8db7d895d0e364dd4768ebc6410
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments