MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad94dbf54fd1708a0ebcf2742a3acfdb42a889870e1a7d715e534e13d58873f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Latrodectus


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: ad94dbf54fd1708a0ebcf2742a3acfdb42a889870e1a7d715e534e13d58873f2
SHA3-384 hash: 73edd6def7bbf2937f2542c22437705a594dc5a935124df9511087357465cca1119d19c403e91c1a9c8a9a234ec57cec
SHA1 hash: 07d4c1e152ca24a01ff328ddbe379a5434c6131c
MD5 hash: ee858b95a1966cd848502c6e3fc1a2e7
humanhash: kitten-december-yankee-mirror
File name:Document-v16-54-07.js
Download: download sample
Signature Latrodectus
File size:49'734 bytes
First seen:2024-12-02 16:56:08 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:lSiIuoFYug+zAPxldQgKDyPY5QJrYeybvQQrkD37sv8E9:cEsYx+zoxldguPYYrYmSGLs0m
TLSH T11923DF05AD93FEF0124835584DC9D2B2ED518186E9A94187808FF3B863077198DBBAFF
Magika javascript
Reporter k3dg3___
Tags:BruteRatel js TA578

Intelligence


File Origin
# of uploads :
1
# of downloads :
434
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Suspicious
Score:
50%
Tags:
spawn sage hype
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
60 / 100
Signature
Document Viewer accesses SMB path (likely to steal NTLM hashes or to download payload)
Office viewer loads remote template
Opens network shares
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: WScript or CScript Dropper
Behaviour
Behavior Graph:
Threat name:
Script-JS.Trojan.BruteRatel
Status:
Malicious
First seen:
2024-12-02 16:57:04 UTC
File Type:
Text (VBS)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery execution
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments