MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b908e32fa44d7672a1a6058355404cf26315ea9e1ff07a34c8ea14fd99241c4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 16 File information Comments

SHA256 hash: b908e32fa44d7672a1a6058355404cf26315ea9e1ff07a34c8ea14fd99241c4f
SHA3-384 hash: a110638284b96115f8aebb60c34198fe7bb099017300dc1ca81990030f44c0b15820c2ca0ad056b033fec1586ce5a218
SHA1 hash: c6806d6020310665ccaad4740a9dfe9905006460
MD5 hash: 6e0722a700af97cc6eb757c919f880fa
humanhash: mockingbird-colorado-oklahoma-charlie
File name:eTDS-XL_Blank_Template.xlsm
Download: download sample
File size:1'207'163 bytes
First seen:2026-04-17 13:20:00 UTC
Last seen:Never
File type:Excel file xlsm
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 24576:tRKZa3wXfh6t9zv3IRqmaLAhgZn0X3tDCOd7lKFahY8yzA8C:tQfWz1vdZ0Ht7lSzAz
TLSH T16A45333EB298FD7DE7378239C26772F275DEA023530920982524E56859B5322E39CCDC
TrID 42.4% (.XLAM) Excel Macro-enabled Open XML add-in (83500/1/13)
29.2% (.XLSM) Excel Microsoft Office Open XML Format document (with Macro) (57500/1/12)
17.3% (.XLSX) Excel Microsoft Office Open XML Format document (34000/1/7)
8.9% (.ZIP) Open Packaging Conventions container (17500/1/4)
2.0% (.ZIP) ZIP compressed archive (4000/1)
Magika xlsx
Reporter abuse_ch
Tags:xlsm

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

Embedded Images

MalwareBazaar found the following images embedded in this file:

MD5 hashdc.creator# of relations
a6e99e59aa92adbde5423befa6fa01a2NVSSY_Home_DellNone
ebcb90903e244a3851df380826e6e050NVSSY_Home_DellNone
OLE dump

MalwareBazaar was able to identify 379 sections in this file using oledump:

Section IDSection sizeSection name
A197 bytesFormPreStart/CompObj
A2291 bytesFormPreStart/VBFrame
A3715 bytesFormPreStart/f
A453363 bytesFormPreStart/o
A55330 bytesPROJECT
A630 bytesPROJECTlk
A73299 bytesPROJECTwm
A897 bytesUserFormActiveError/CompObj
A9343 bytesUserFormActiveError/VBFrame
A10139 bytesUserFormActiveError/f
A1164 bytesUserFormActiveError/o
A1297 bytesUserFormBegin/CompObj
A13304 bytesUserFormBegin/VBFrame
A14431 bytesUserFormBegin/f
A15112 bytesUserFormBegin/i02/CompObj
A16537 bytesUserFormBegin/i02/f
A17780 bytesUserFormBegin/i02/o
A18112 bytesUserFormBegin/i06/CompObj
A19205 bytesUserFormBegin/i06/f
A20220 bytesUserFormBegin/i06/o
A21112 bytesUserFormBegin/i08/CompObj
A22205 bytesUserFormBegin/i08/f
A23452 bytesUserFormBegin/i08/o
A2452843 bytesUserFormBegin/o
A2597 bytesUserFormCheckingforNewVersion/CompObj
A26360 bytesUserFormCheckingforNewVersion/VBFrame
A27170 bytesUserFormCheckingforNewVersion/f
A28156 bytesUserFormCheckingforNewVersion/o
A2997 bytesUserFormDEV/CompObj
A30295 bytesUserFormDEV/VBFrame
A31187 bytesUserFormDEV/f
A32112 bytesUserFormDEV/i02/CompObj
A33257 bytesUserFormDEV/i02/f
A345274 bytesUserFormDEV/i02/o
A3552531 bytesUserFormDEV/o
A3697 bytesUserFormErrors/CompObj
A37338 bytesUserFormErrors/VBFrame
A38315 bytesUserFormErrors/f
A3952883 bytesUserFormErrors/o
A4097 bytesUserFormFileFVU/CompObj
A41316 bytesUserFormFileFVU/VBFrame
A42267 bytesUserFormFileFVU/f
A43112 bytesUserFormFileFVU/i02/CompObj
A44265 bytesUserFormFileFVU/i02/f
A45256 bytesUserFormFileFVU/i02/o
A46112 bytesUserFormFileFVU/i04/CompObj
A47221 bytesUserFormFileFVU/i04/f
A48180 bytesUserFormFileFVU/i04/o
A49196 bytesUserFormFileFVU/o
A5097 bytesUserFormImporting/CompObj
A51335 bytesUserFormImporting/VBFrame
A52171 bytesUserFormImporting/f
A53112 bytesUserFormImporting/i02/CompObj
A54281 bytesUserFormImporting/i02/f
A55444 bytesUserFormImporting/i02/o
A56112 bytesUserFormImporting/i04/CompObj
A57237 bytesUserFormImporting/i04/f
A58220 bytesUserFormImporting/i04/o
A590 bytesUserFormImporting/o
A6097 bytesUserFormPANCheck/CompObj
A61305 bytesUserFormPANCheck/VBFrame
A62355 bytesUserFormPANCheck/f
A63488 bytesUserFormPANCheck/o
A6497 bytesUserFormPANCheckStart/CompObj
A65317 bytesUserFormPANCheckStart/VBFrame
A66171 bytesUserFormPANCheckStart/f
A67112 bytesUserFormPANCheckStart/i01/CompObj
A68261 bytesUserFormPANCheckStart/i01/f
A69536 bytesUserFormPANCheckStart/i01/o
A70112 bytesUserFormPANCheckStart/i05/CompObj
A71353 bytesUserFormPANCheckStart/i05/f
A72796 bytesUserFormPANCheckStart/i05/o
A730 bytesUserFormPANCheckStart/o
A7497 bytesUserFormPreValidation/CompObj
A75350 bytesUserFormPreValidation/VBFrame
A76311 bytesUserFormPreValidation/f
A77524 bytesUserFormPreValidation/o
A7897 bytesUserFormProgress/CompObj
A79344 bytesUserFormProgress/VBFrame
A80259 bytesUserFormProgress/f
A81212 bytesUserFormProgress/o
A8297 bytesUserFormRegister/CompObj
A83329 bytesUserFormRegister/VBFrame
A84755 bytesUserFormRegister/f
A8570191 bytesUserFormRegister/o
A8697 bytesUserFormRegisterCheckFail/CompObj
A87316 bytesUserFormRegisterCheckFail/VBFrame
A88575 bytesUserFormRegisterCheckFail/f
A8965703 bytesUserFormRegisterCheckFail/o
A9097 bytesUserFormRegisterPricing/CompObj
A91306 bytesUserFormRegisterPricing/VBFrame
A92663 bytesUserFormRegisterPricing/f
A931840 bytesUserFormRegisterPricing/o
A9497 bytesUserFormRegisterQuote/CompObj
A95306 bytesUserFormRegisterQuote/VBFrame
A96911 bytesUserFormRegisterQuote/f
A972296 bytesUserFormRegisterQuote/o
A9897 bytesUserFormRegisterShowComputerID/CompObj
A99320 bytesUserFormRegisterShowComputerID/VBFrame
A100223 bytesUserFormRegisterShowComputerID/f
A101220 bytesUserFormRegisterShowComputerID/o
A10297 bytesUserFormSaveMap/CompObj
A103302 bytesUserFormSaveMap/VBFrame
A104331 bytesUserFormSaveMap/f
A105500 bytesUserFormSaveMap/o
A10697 bytesUserFormSelectDataFile/CompObj
A107318 bytesUserFormSelectDataFile/VBFrame
A108595 bytesUserFormSelectDataFile/f
A109900 bytesUserFormSelectDataFile/o
A11097 bytesUserFormSelectForm/CompObj
A111304 bytesUserFormSelectForm/VBFrame
A112315 bytesUserFormSelectForm/f
A113112 bytesUserFormSelectForm/i05/CompObj
A114317 bytesUserFormSelectForm/i05/f
A115324 bytesUserFormSelectForm/i05/o
A116112 bytesUserFormSelectForm/i17/CompObj
A117277 bytesUserFormSelectForm/i17/f
A118168 bytesUserFormSelectForm/i17/o
A119344 bytesUserFormSelectForm/o
A12097 bytesUserFormSelectMapFile/CompObj
A121284 bytesUserFormSelectMapFile/VBFrame
A12238 bytesUserFormSelectMapFile/f
A1230 bytesUserFormSelectMapFile/o
A12497 bytesUserFormSendingToWeb/CompObj
A125352 bytesUserFormSendingToWeb/VBFrame
A126170 bytesUserFormSendingToWeb/f
A127156 bytesUserFormSendingToWeb/o
A12897 bytesUserFormStart/CompObj
A129349 bytesUserFormStart/VBFrame
A130183 bytesUserFormStart/f
A131115 bytesUserFormStart/i90/CompObj
A132348 bytesUserFormStart/i90/f
A133110 bytesUserFormStart/i90/i197/CompObj
A134396 bytesUserFormStart/i90/i197/f
A135520 bytesUserFormStart/i90/i197/o
A136110 bytesUserFormStart/i90/i198/CompObj
A137256 bytesUserFormStart/i90/i198/f
A138308 bytesUserFormStart/i90/i198/o
A139110 bytesUserFormStart/i90/i199/CompObj
A140328 bytesUserFormStart/i90/i199/f
A141112 bytesUserFormStart/i90/i199/i243/CompObj
A142101 bytesUserFormStart/i90/i199/i243/f
A1430 bytesUserFormStart/i90/i199/i243/o
A144412 bytesUserFormStart/i90/i199/o
A145110 bytesUserFormStart/i90/i201/CompObj
A146188 bytesUserFormStart/i90/i201/f
A147112 bytesUserFormStart/i90/i201/i244/CompObj
A14893 bytesUserFormStart/i90/i201/i244/f
A1490 bytesUserFormStart/i90/i201/i244/o
A150112 bytesUserFormStart/i90/i201/i246/CompObj
A15197 bytesUserFormStart/i90/i201/i246/f
A1520 bytesUserFormStart/i90/i201/i246/o
A153112 bytesUserFormStart/i90/i201/i248/CompObj
A15493 bytesUserFormStart/i90/i201/i248/f
A1550 bytesUserFormStart/i90/i201/i248/o
A1560 bytesUserFormStart/i90/i201/o
A157110 bytesUserFormStart/i90/i92/CompObj
A158624 bytesUserFormStart/i90/i92/f
A15953299 bytesUserFormStart/i90/i92/o
A160110 bytesUserFormStart/i90/i93/CompObj
A161148 bytesUserFormStart/i90/i93/f
A162112 bytesUserFormStart/i90/i93/i238/CompObj
A163425 bytesUserFormStart/i90/i93/i238/f
A164524 bytesUserFormStart/i90/i93/i238/o
A165112 bytesUserFormStart/i90/i93/i242/CompObj
A16693 bytesUserFormStart/i90/i93/i242/f
A1670 bytesUserFormStart/i90/i93/i242/o
A1680 bytesUserFormStart/i90/i93/o
A169316 bytesUserFormStart/i90/o
A17096 bytesUserFormStart/i90/x
A17156 bytesUserFormStart/o
A17297 bytesUserFormTRACESPANcheck/CompObj
A173315 bytesUserFormTRACESPANcheck/VBFrame
A174179 bytesUserFormTRACESPANcheck/f
A175480 bytesUserFormTRACESPANcheck/o
A17697 bytesUserFormeTDSZIP/CompObj
A177266 bytesUserFormeTDSZIP/VBFrame
A178151 bytesUserFormeTDSZIP/f
A17952535 bytesUserFormeTDSZIP/o
A1805959 bytesVBA/Download_latest
A1814600 bytesVBA/FormPreStart
A18217957 bytesVBA/ModuleCommonGenerate
A183123366 bytesVBA/ModuleCorrection_Common
A1844906 bytesVBA/ModuleCreateMaster
A1856628 bytesVBA/ModuleImportOldData
A18619678 bytesVBA/ModuleImporting
A18729722 bytesVBA/ModuleJustificationReport
A18839261 bytesVBA/ModuleLic
A18914986 bytesVBA/ModuleReports
A19018140 bytesVBA/ModuleTools
A19120199 bytesVBA/ModuleVerify
A192109359 bytesVBA/Module_Common
A19397652 bytesVBA/Module_Corr_24
A19449149 bytesVBA/Module_Corr_26
A19551235 bytesVBA/Module_Corr_27
A19648079 bytesVBA/Module_Corr_27E
A19713617 bytesVBA/Module_Corr_Functions
A19813379 bytesVBA/Module_PANVerification
A1991339 bytesVBA/Module_PreCheck
A20045335 bytesVBA/Module_Process_24
A20165109 bytesVBA/Module_Process_24Q4
A20245209 bytesVBA/Module_Process_26
A20344766 bytesVBA/Module_Process_27
A20443205 bytesVBA/Module_Process_27EQ
A2051188 bytesVBA/Sheet1
A2061181 bytesVBA/Sheet10
A2072183 bytesVBA/Sheet11
A2082534 bytesVBA/Sheet12
A2091181 bytesVBA/Sheet13
A2102534 bytesVBA/Sheet14
A2112548 bytesVBA/Sheet15
A2121189 bytesVBA/Sheet16
A2131189 bytesVBA/Sheet17
A2142534 bytesVBA/Sheet18
A2152168 bytesVBA/Sheet19
A2161188 bytesVBA/Sheet2
A2172467 bytesVBA/Sheet20
A2181189 bytesVBA/Sheet21
A2191189 bytesVBA/Sheet23
A2201595 bytesVBA/Sheet27
A2212772 bytesVBA/Sheet3
A2221188 bytesVBA/Sheet4
A2231188 bytesVBA/Sheet5
A2241188 bytesVBA/Sheet6
A2251188 bytesVBA/Sheet7
A2262579 bytesVBA/Sheet8
A2271188 bytesVBA/Sheet9
A2284089 bytesVBA/ThisWorkbook
A2293166 bytesVBA/UserFormActiveError
A2306270 bytesVBA/UserFormBegin
A2315069 bytesVBA/UserFormCheckingforNewVersion
A2328154 bytesVBA/UserFormDEV
A2336477 bytesVBA/UserFormErrors
A2343002 bytesVBA/UserFormFileFVU
A2353698 bytesVBA/UserFormImporting
A2365780 bytesVBA/UserFormPANCheck
A2372080 bytesVBA/UserFormPANCheckStart
A2384456 bytesVBA/UserFormPreValidation
A2391810 bytesVBA/UserFormProgress
A2405516 bytesVBA/UserFormRegister
A2412265 bytesVBA/UserFormRegisterCheckFail
A2423320 bytesVBA/UserFormRegisterPricing
A2439787 bytesVBA/UserFormRegisterQuote
A2442094 bytesVBA/UserFormRegisterShowComputerID
A2455907 bytesVBA/UserFormSaveMap
A2467117 bytesVBA/UserFormSelectDataFile
A24717020 bytesVBA/UserFormSelectForm
A2481464 bytesVBA/UserFormSelectMapFile
A2492807 bytesVBA/UserFormSendingToWeb
A25033906 bytesVBA/UserFormStart
A2511681 bytesVBA/UserFormTRACESPANcheck
A2521931 bytesVBA/UserFormeTDSZIP
A25344912 bytesVBA/_VBA_PROJECT
A25496715 bytesVBA/__SRP_0
A2556193 bytesVBA/__SRP_1
A256176 bytesVBA/__SRP_10
A257170 bytesVBA/__SRP_11
A258806 bytesVBA/__SRP_12
A259156 bytesVBA/__SRP_13
A2603306 bytesVBA/__SRP_14
A261384 bytesVBA/__SRP_15
A262384 bytesVBA/__SRP_16
A2631618 bytesVBA/__SRP_17
A264464 bytesVBA/__SRP_18
A265106 bytesVBA/__SRP_19
A266176 bytesVBA/__SRP_1a
A267170 bytesVBA/__SRP_1b
A268464 bytesVBA/__SRP_1c
A269106 bytesVBA/__SRP_1d
A270171 bytesVBA/__SRP_1e
A271184 bytesVBA/__SRP_1f
A272274 bytesVBA/__SRP_2
A273102464 bytesVBA/__SRP_20
A2742024 bytesVBA/__SRP_21
A275663 bytesVBA/__SRP_22
A276992 bytesVBA/__SRP_23
A277461 bytesVBA/__SRP_24
A278636 bytesVBA/__SRP_25
A279360 bytesVBA/__SRP_26
A280526 bytesVBA/__SRP_27
A281214 bytesVBA/__SRP_28
A282238 bytesVBA/__SRP_29
A283207 bytesVBA/__SRP_2a
A284264 bytesVBA/__SRP_2b
A285265 bytesVBA/__SRP_2c
A286288 bytesVBA/__SRP_2d
A287176 bytesVBA/__SRP_2e
A288170 bytesVBA/__SRP_2f
A289446 bytesVBA/__SRP_3
A290650 bytesVBA/__SRP_30
A291182 bytesVBA/__SRP_31
A292464 bytesVBA/__SRP_32
A293106 bytesVBA/__SRP_33
A294464 bytesVBA/__SRP_34
A295106 bytesVBA/__SRP_35
A296464 bytesVBA/__SRP_36
A297106 bytesVBA/__SRP_37
A298464 bytesVBA/__SRP_38
A299106 bytesVBA/__SRP_39
A300464 bytesVBA/__SRP_3a
A301106 bytesVBA/__SRP_3b
A302464 bytesVBA/__SRP_3c
A303106 bytesVBA/__SRP_3d
A304464 bytesVBA/__SRP_3e
A305106 bytesVBA/__SRP_3f
A306222 bytesVBA/__SRP_4
A307650 bytesVBA/__SRP_40
A308182 bytesVBA/__SRP_41
A309836 bytesVBA/__SRP_42
A310258 bytesVBA/__SRP_43
A311836 bytesVBA/__SRP_44
A312258 bytesVBA/__SRP_45
A313836 bytesVBA/__SRP_46
A314258 bytesVBA/__SRP_47
A315836 bytesVBA/__SRP_48
A316258 bytesVBA/__SRP_49
A317836 bytesVBA/__SRP_4a
A318258 bytesVBA/__SRP_4b
A319836 bytesVBA/__SRP_4c
A320258 bytesVBA/__SRP_4d
A321836 bytesVBA/__SRP_4e
A322258 bytesVBA/__SRP_4f
A323358 bytesVBA/__SRP_5
A324464 bytesVBA/__SRP_50
A325106 bytesVBA/__SRP_51
A326464 bytesVBA/__SRP_52
A327106 bytesVBA/__SRP_53
A328464 bytesVBA/__SRP_54
A329106 bytesVBA/__SRP_55
A330464 bytesVBA/__SRP_56
A331106 bytesVBA/__SRP_57
A332170 bytesVBA/__SRP_58
A333176 bytesVBA/__SRP_59
A33415334 bytesVBA/__SRP_5a
A335492 bytesVBA/__SRP_5b
A3361258 bytesVBA/__SRP_5c
A337374 bytesVBA/__SRP_5d
A338507 bytesVBA/__SRP_6
A3391749 bytesVBA/__SRP_60
A340470 bytesVBA/__SRP_61
A341898 bytesVBA/__SRP_62
A342284 bytesVBA/__SRP_63
A343170 bytesVBA/__SRP_64
A344174 bytesVBA/__SRP_65
A345170 bytesVBA/__SRP_66
A346174 bytesVBA/__SRP_67
A347170 bytesVBA/__SRP_68
A348174 bytesVBA/__SRP_69
A349170 bytesVBA/__SRP_6a
A350174 bytesVBA/__SRP_6b
A3512008 bytesVBA/__SRP_6c
A352392 bytesVBA/__SRP_6d
A3531769 bytesVBA/__SRP_6e
A354424 bytesVBA/__SRP_6f
A355724 bytesVBA/__SRP_7
A356458 bytesVBA/__SRP_74
A357594 bytesVBA/__SRP_75
A3582496 bytesVBA/__SRP_76
A359260 bytesVBA/__SRP_77
A3605584 bytesVBA/__SRP_78
A361356 bytesVBA/__SRP_79
A362968 bytesVBA/__SRP_7a
A363106 bytesVBA/__SRP_7b
A3642154 bytesVBA/__SRP_7c
A365256 bytesVBA/__SRP_7d
A3663042 bytesVBA/__SRP_7e
A367406 bytesVBA/__SRP_7f
A36837538 bytesVBA/__SRP_8
A3692088 bytesVBA/__SRP_80
A370206 bytesVBA/__SRP_81
A3713080 bytesVBA/__SRP_9
A3721926 bytesVBA/__SRP_a
A37323316 bytesVBA/__SRP_b
A374505 bytesVBA/__SRP_c
A375666 bytesVBA/__SRP_d
A37611945 bytesVBA/__SRP_e
A3772228 bytesVBA/__SRP_f
A3784999 bytesVBA/dir

Intelligence


File Origin
# of uploads :
1
# of downloads :
129
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
xlsm
Verdict:
No threats detected
Analysis date:
2026-04-17 13:23:27 UTC
Tags:
macros macros-on-open doc-url

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
whiteice office macro micro
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Launching a service
Searching for synchronization primitives
Creating a file
Delayed writing of the file
Result
Verdict:
Malicious
File Type:
Excel File with Macro
Behaviour
BlacklistAPI detected
Document image
Document image
Gathering data
Verdict:
Malicious
Labled as:
Msoffice/malicious_confidence_100%
Label:
Benign
Suspicious Score:
/10
Score Malicious:
%
Score Benign:
1%
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl.evad
Score:
64 / 100
Signature
Document contains an embedded VBA macro with suspicious strings
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-04-11 16:03:05 UTC
File Type:
Document
Extracted files:
547
AV detection:
7 of 36 (19.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Hancitor
Author:Dhanunjaya
Description:Yara Rule To Detect Hancitor
Rule name:informational_win_ole_protected
Author:Jeff White (karttoon@gmail.com) @noottrak
Description:Identify OLE Project protection within documents.
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:TA505_Maldoc_21Nov_2
Author:Arkbird_SOLG
Description:invitation (1).xls
Reference:https://twitter.com/58_158_177_102/status/1197432303057637377
Rule name:telebot_framework
Author:vietdx.mb
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:vbaproject_bin
Author:CD_R0M_
Description:{76 62 61 50 72 6f 6a 65 63 74 2e 62 69 6e} is hex for vbaproject.bin. Macros are often used by threat actors. Work in progress - Ran out of time
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments