MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8a8e382ba1f7d1ab4b00d3e03f63ca65b2e459f3b01006bf44b3cf9950b7ceb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SideWinder


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: c8a8e382ba1f7d1ab4b00d3e03f63ca65b2e459f3b01006bf44b3cf9950b7ceb
SHA3-384 hash: a8e577d121dfc0e16219ddd04476a0e4f36a5ccaaad6c72eee16935078c587847f390600a08b17a229166287b20a8c8f
SHA1 hash: f0a2bb57da87b579e5027631066a9652d64d67b7
MD5 hash: 86eeb037f5669bff655de1e08199a554
humanhash: seventeen-hamper-zebra-kitten
File name:c8a8e382ba1f7d1ab4b00d3e03f63ca65b2e459f3b01006bf44b3cf9950b7ceb.docx
Download: download sample
Signature SideWinder
File size:17'414 bytes
First seen:2024-12-13 11:35:41 UTC
Last seen:Never
File type:Word file doc
MIME type:application/vnd.openxmlformats-officedocument.wordprocessingml.document
ssdeep 384:o2fQ+vZ4D6L9bIsQj0OUeZFpLKQ+axX/mc7TmmK5:8ZD6L98sQjmSmM5ecum6
TLSH T16572CFB8C06FD45AC417E379D0E94B25B72F096246D5122ABE2222DFC542AF41B0AA41
TrID 52.2% (.DOCX) Word Microsoft Office Open XML Format document (23500/1/4)
38.8% (.ZIP) Open Packaging Conventions container (17500/1/4)
8.8% (.ZIP) ZIP compressed archive (4000/1)
Magika docx
Reporter JAMESWT_WT
Tags:doc SideWinder

Intelligence


File Origin
# of uploads :
1
# of downloads :
2'985
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c8a8e382ba1f7d1ab4b00d3e03f63ca65b2e459f3b01006bf44b3cf9950b7ceb.docx.doc
Verdict:
Suspicious activity
Analysis date:
2024-12-13 11:47:43 UTC
Tags:
ta399 apt

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
virus w97m remo
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Creating a file
DNS request
Connection attempt
Sending a custom TCP request
Query of malicious DNS domain
Launching a process by exploiting the app vulnerability
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade
Gathering data
Result
Verdict:
MALICIOUS
Details
External Relationship Element
Document contains an externally hosted relationship, which fetches further content.
Result
Threat name:
Sidewinder
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains an external reference to another file
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Office viewer loads remote template
Outdated Microsoft Office dropper detected
Suricata IDS alerts for network traffic
Yara detected Sidewinder
Behaviour
Behavior Graph:
Threat name:
Document-Office.Trojan.RemoteTemplateInj
Status:
Malicious
First seen:
2024-01-05 03:31:06 UTC
File Type:
Document
Extracted files:
12
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies registry class
NTFS ADS
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
System Location Discovery: System Language Discovery
Drops file in Windows directory
Process spawned unexpected child process
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments