MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a0f6d9d905b64be221a64da385ad1fd14542c93b35f23cdcbedf71febc68a505. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: a0f6d9d905b64be221a64da385ad1fd14542c93b35f23cdcbedf71febc68a505
SHA3-384 hash: fdbd4e99df34f718b42d1b05845a490efb553708aa842530cfbc00e551d7da18dd6621b8678ade1c0ac3007169b27375
SHA1 hash: 87ab8351719c70bc5f611d736e32a8a19fce8a2f
MD5 hash: d58141c856b4831f0c7deb594c4fd25b
humanhash: four-mobile-spring-nevada
File name:PO04012022.ppam
Download: download sample
File size:8'801 bytes
First seen:2022-01-05 14:51:37 UTC
Last seen:2022-01-06 20:52:21 UTC
File type:PowerPoint file ppam
MIME type:application/vnd.openxmlformats-officedocument.presentationml.presentation
ssdeep 192:sz8PvSFUzffz6qQaQzGbjeaS1UujK2ho/Erp/Z2i7H:sz8PvQULzCKKQQMEr1t
TLSH T16402A03D9741927ECB33963ABF6D08C233DE5048EEACD11E255ABD4E0792987074292E
Reporter James_inthe_box
Tags:ppam

Intelligence


File Origin
# of uploads :
2
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Legacy PowerPoint File with Macro
Payload URLs
URL
File name
http://www.j.mp/askswewewewzxzxkd
qwqwae.d
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
macros macros-on-open
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Suspicious URL
Macro contails a suspicious URL to a Tor .onion services, URL shortening services, or file upload provider.
MSHTA Pivot
Macro may contain a pivot to an external URL resource via MSHTA.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
64 / 100
Signature
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Document-Word.Downloader.Powdow
Status:
Malicious
First seen:
2022-01-05 08:10:16 UTC
File Type:
Document
Extracted files:
21
AV detection:
17 of 43 (39.53%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments