MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fcb69ca23bc04ccfc6ee63c29372ce2f9493dd4ff223a7daf830c0d4478a8d2b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: fcb69ca23bc04ccfc6ee63c29372ce2f9493dd4ff223a7daf830c0d4478a8d2b
SHA3-384 hash: 1b2c47c878114b6f60dfd7e9ce8e5bf5f014680a1ba1ef4ea6f3cabc3be46f113b3f9f43de1df2cdbf29b749427a1f1c
SHA1 hash: 8c98e8e2ffda2cf784c2fb6703b45e8b700271bf
MD5 hash: a360991de4d5d2c187bc54ae67b39063
humanhash: aspen-michigan-echo-quiet
File name:Estimate Sample.xlsx
Download: download sample
File size:61'486 bytes
First seen:2025-11-10 09:43:48 UTC
Last seen:Never
File type:Excel file xlsx
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 1536:sWOfwTewq0jdV2LadtuX3QHIUMzJT19InW:6fKewqSdi6uXgKzJJ2nW
TLSH T10453F16DE2E1A974D0339D3CD1DDA4D7F10803D59222A71F5DC4BB68AB838AB13D7182
TrID 61.2% (.XLSX) Excel Microsoft Office Open XML Format document (34000/1/7)
31.5% (.ZIP) Open Packaging Conventions container (17500/1/4)
7.2% (.ZIP) ZIP compressed archive (4000/1)
Magika xlsx
Reporter cocaman
Tags:SWIFT xlsx


Avatar
cocaman
Malicious email (T1566.001)
From: "Quantities Materials Takeoff Services <bidhelp@planswiftestimating.com>" (likely spoofed)
Received: "from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) "
Date: "Sat, 8 Nov 2025 10:57:00 -0500"
Subject: "Construction Estimate Sheet - Fee & ETA Details"
Attachment: "Estimate Sample.xlsx"

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Estimate Sample.xlsx
Verdict:
No threats detected
Analysis date:
2025-11-10 09:45:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
Result
Verdict:
Clean
File Type:
OOXML File with External Links
Label:
Benign
Suspicious Score:
/10
Score Malicious:
%
Score Benign:
1%
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
4 / 100
Behaviour
Behavior Graph:
n/a
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Office Document
Threat name:
Document.Trojan.Heuristic
Status:
Malicious
First seen:
2025-06-26 12:35:02 UTC
File Type:
Document
Extracted files:
24
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Excel file xlsx fcb69ca23bc04ccfc6ee63c29372ce2f9493dd4ff223a7daf830c0d4478a8d2b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments