MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9652557485be4ae5b8b28e1a0f0b954efacf16f22501eaf25a2cf2de3862b76f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ConnectWise


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 9652557485be4ae5b8b28e1a0f0b954efacf16f22501eaf25a2cf2de3862b76f
SHA3-384 hash: 9198d5813551154c721241c602fe5e15a0afb7d8d365fd7c18d9a817a7a1671fbb1b8b480602c34bf9ca5b2a7addfc28
SHA1 hash: 8c165efe79e8937f26f942c248089e2909978642
MD5 hash: ffe6b185808e1cd24bfc9b86bccbf407
humanhash: kilo-failed-victor-table
File name:SSTS218947014.pdf
Download: download sample
Signature ConnectWise
File size:43'197 bytes
First seen:2024-12-11 17:36:27 UTC
Last seen:Never
File type: pdf
MIME type:application/pdf
ssdeep 768:NgP2kREB4cqfokk62hOoaSJiuyFjlk7tmUEZoXxqS5IWLxa8qxzjOqv9AB3:Na2kRm43fokkxtMVtGQU/V5XLXqxm
TLSH T16513ADB1CF5BE5A3EC8F1E70D46A7E54BC48786963600DB162328D1EF885E7074262BD
Magika pdf
Reporter malwarology
Tags:pdf

Intelligence


File Origin
# of uploads :
1
# of downloads :
250
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
agent sage remo
Gathering data
Result
Verdict:
UNKNOWN
Details
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Result
Threat name:
ScreenConnect Tool, Phisher
Detection:
malicious
Classification:
phis
Score:
72 / 100
Signature
AI detected landing page (webpage, office document or email)
Antivirus detection for URL or domain
Contains functionality to hide user accounts
Multi AV Scanner detection for dropped file
Yara detected Phisher
Behaviour
Behavior Graph:
Threat name:
Document-PDF.Trojan.ScamX
Status:
Malicious
First seen:
2024-12-11 14:59:20 UTC
AV detection:
7 of 38 (18.42%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ConnectWise

pdf 9652557485be4ae5b8b28e1a0f0b954efacf16f22501eaf25a2cf2de3862b76f

(this sample)

Comments