Static task
static1
Behavioral task
behavioral1
Sample
53aeb4ec6610971b46cd3f32b16c2d558919066e035a4b6c49514bb450c58513.doc
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
53aeb4ec6610971b46cd3f32b16c2d558919066e035a4b6c49514bb450c58513.doc
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
5171146342039552.zip
-
Size
71KB
-
MD5
306a197fb1dfa4b1292a0b91bcf51745
-
SHA1
7c910ca33807744769eac41983239e97108089dd
-
SHA256
45afe30e805d5fea304d08f6605b7130de25214d521dc94c85b2b9a46de51d38
-
SHA512
66fa444e3134381a9b7242fac4bc96c7d6b8fc017b0c11bacabf39425983eb81bb02a432b77fd35dc0db29da6669d5093ea68f99a9b2bd6c8c3e94f8abf054c6
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/53aeb4ec6610971b46cd3f32b16c2d558919066e035a4b6c49514bb450c58513 office_macros
Files
-
5171146342039552.zip.zip
Password: infected
-
53aeb4ec6610971b46cd3f32b16c2d558919066e035a4b6c49514bb450c58513.doc office2007
ThisDocument
frm
repoRequest
varTextProcedure
copyBuffer