Report - Manulife_policy.xls

VBA_macro Generic Malware MSOffice File
ScreenShot
Created 2021.10.08 14:47 Machine s1_win7_x6401
Filename Manulife_policy.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Titl
AI Score Not founds Behavior Score
2.8
ZERO API file : mailcious
VT API (file) 25 detected (SLoad, Valyria, ZAgent, MWLF, DLOADR, TIOIBEPP, AEKW, UMal, vrybv@0, Obfuse)
md5 128a2d6105360896238515c941c67f88
sha256 4648edc370e61a52c95d3f525391e0154406fd661d01d091f2d9dba9f8a485f2
ssdeep 1536:Gvyk3hbdlylKsgqopeJBWhZFGkE+cL2NdAIG7SPtKoSDu33ufGbD:kyk3hbdlylKsgqopeJBWhZFGkE+cL2ND
imphash
impfuzzy
  Network IP location

Signature (4cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)

Rules (3cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
194.180.174.6 MD MivoCloud SRL 194.180.174.6 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure