MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f7c9d20dd6146600dbd1769e9e0c55cd6df66ca6d81e8d620ac89aed9c8cef50. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SilentBuilder


Vendor detections: 9


Maldoc score: 10


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: f7c9d20dd6146600dbd1769e9e0c55cd6df66ca6d81e8d620ac89aed9c8cef50
SHA3-384 hash: 82ea6a8c6137edee2fe44821a5546c9eefe4779bf8057edb0d2228d4f1f82cc8bf1c29188876ded4c31845198cafeedf
SHA1 hash: 3a64ab2f972cb643a0c0558ea5df0a2d6f300202
MD5 hash: 5d6ef9cce2eee7b41ad4c8dfc97b7b9d
humanhash: finch-uranus-leopard-bravo
File name:SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.21038.12437
Download: download sample
Signature SilentBuilder
File size:280'576 bytes
First seen:2022-09-22 01:07:20 UTC
Last seen:Never
File type:Excel file xlsx
MIME type:application/vnd.ms-excel
ssdeep 6144:KcPiTQAVW/89BQnmlcGvgZ7r3J8b5IXJK++DiR:miR
TLSH T1B654C3D2B112A164E1585F36E826417C42EBEEAA7B78F18B2C04F3B73B771D13E41919
TrID 80.2% (.XLS) Microsoft Excel sheet (32500/1/3)
19.7% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter SecuriteInfoCom
Tags:SilentBuilder xlsx

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 10
OLE dump

MalwareBazaar was able to identify 3 sections in this file using oledump:

Section IDSection sizeSection name
14096 bytesDocumentSummaryInformation
24096 bytesSummaryInformation
3268492 bytesBook
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
Hex StringEcFVHHU45634656484855
Hex StringEeFEdeF45654645646546
IOCnetr.dllExecutable file name
SuspiciousRUNMay run an executable file or a system command
SuspiciousEXECMay run an executable file or a system
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)
SuspiciousBase64 StringsBase64-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)
SuspiciousXLM macroXLM macro found. It may contain malicious code

Intelligence


File Origin
# of uploads :
1
# of downloads :
375
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.21038.12437
Verdict:
Malicious activity
Analysis date:
2022-09-22 01:14:22 UTC
Tags:
macros maldoc-42

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malicious
File Type:
Legacy Office File
Payload URLs
URL
File name
https://emploimed.com/netr.dll,adToF
Book
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
macros macros-on-open rundll32
Label:
Malicious
Suspicious Score:
6.7/10
Score Malicious:
67%
Score Benign:
33%
Result
Threat name:
Hidden Macro 4.0
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found Excel 4.0 Macro with suspicious formulas
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Outdated Microsoft Office dropper detected
Yara detected hidden Macro 4.0 in Excel
Behaviour
Behavior Graph:
Threat name:
Document-Excel.Trojan.Stratos
Status:
Malicious
First seen:
2021-05-01 14:20:47 UTC
File Type:
Document
Extracted files:
3
AV detection:
17 of 47 (36.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
macro xlm
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Process spawned unexpected child process
Malware Config
Dropper Extraction:
https://emploimed.com/netr.dll
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments