MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ad94dbf54fd1708a0ebcf2742a3acfdb42a889870e1a7d715e534e13d58873f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Latrodectus
Vendor detections: 6
| SHA256 hash: | ad94dbf54fd1708a0ebcf2742a3acfdb42a889870e1a7d715e534e13d58873f2 |
|---|---|
| SHA3-384 hash: | 73edd6def7bbf2937f2542c22437705a594dc5a935124df9511087357465cca1119d19c403e91c1a9c8a9a234ec57cec |
| SHA1 hash: | 07d4c1e152ca24a01ff328ddbe379a5434c6131c |
| MD5 hash: | ee858b95a1966cd848502c6e3fc1a2e7 |
| humanhash: | kitten-december-yankee-mirror |
| File name: | Document-v16-54-07.js |
| Download: | download sample |
| Signature | Latrodectus |
| File size: | 49'734 bytes |
| First seen: | 2024-12-02 16:56:08 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | text/plain |
| ssdeep | 768:lSiIuoFYug+zAPxldQgKDyPY5QJrYeybvQQrkD37sv8E9:cEsYx+zoxldguPYYrYmSGLs0m |
| TLSH | T11923DF05AD93FEF0124835584DC9D2B2ED518186E9A94187808FF3B863077198DBBAFF |
| Magika | javascript |
| Reporter | |
| Tags: | BruteRatel js TA578 |
Intelligence
File Origin
# of uploads :
1
# of downloads :
434
Origin country :
USVendor Threat Intelligence
Verdict:
Suspicious
Score:
50%
Tags:
spawn sage hype
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
60 / 100
Signature
Document Viewer accesses SMB path (likely to steal NTLM hashes or to download payload)
Office viewer loads remote template
Opens network shares
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: WScript or CScript Dropper
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Script-JS.Trojan.BruteRatel
Status:
Malicious
First seen:
2024-12-02 16:57:04 UTC
File Type:
Text (VBS)
AV detection:
8 of 24 (33.33%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
discovery execution
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.06
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Distributed via e-mail link
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.