MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0d443055143cbd6bce8ef96b52d430e2db321b37b8b93a2a9d0354651702790. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: f0d443055143cbd6bce8ef96b52d430e2db321b37b8b93a2a9d0354651702790
SHA3-384 hash: 4035c81f087814e60b2494ae9b072ee389f38b9c6dc467bcc50afb3abc450670af0ec53741cbe66a1972bf33b3088abc
SHA1 hash: 01a3230a0b7987e2ac597e33eaec256a40448484
MD5 hash: 828ff72e8d3dffcc232e6ae2ff100f45
humanhash: july-wisconsin-sodium-nineteen
File name:previewme.doc
Download: download sample
File size:103'624 bytes
First seen:2026-02-03 13:15:36 UTC
Last seen:Never
File type:Word file doc
MIME type:text/rtf
ssdeep 768:qAUgKfstEXYqwSp1pzpXpopFpvpapZpMwn7KprwswOgwdwdwQk9TLeAHRNLSJ0s:qAUKtEIqFTF5SbN8bC0eZfmSCy9fZvts
TLSH T1C5A353AC018C15E9D29251907F1FF0406D6BF9351CF18CA431EFCEBB60AE69AC9E7A11
TrID 83.3% (.RTF) Rich Text Format (5000/1)
16.6% (.JSON) JSON object (generic) (1000/1)
Magika rtf
Reporter smica83
Tags:CVE-2026-21509 doc

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
MSO
Details
MSO
extracted component(s) such as package(s) and OLE files
Malware family:
n/a
ID:
1
File name:
previewme.doc
Verdict:
No threats detected
Analysis date:
2026-02-03 13:17:24 UTC
Tags:
ole-embedded generated-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Legit
File type:
application/msword
Has a screenshot:
False
Contains macros:
False
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Connection attempt
Creating a window
Сreating synchronization primitives
Creating a file
Searching for the window
Result
Verdict:
Malicious
File Type:
Fake RTF File
Behaviour
BlacklistAPI detected
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
explorer
Label:
Benign
Suspicious Score:
/10
Score Malicious:
%
Score Benign:
1%
Verdict:
Clean
File Type:
rtf
First seen:
2026-02-02T09:02:00Z UTC
Last seen:
2026-02-02T09:10:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Malicious sample detected (through community Yara rule)
Office drops RTF file
Behaviour
Behavior Graph:
Gathering data
Gathering data
Threat name:
Document-RTF.Exploit.CVE-2026-21509
Status:
Malicious
First seen:
2026-01-28 13:51:56 UTC
File Type:
Document
Extracted files:
16
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments