Behavioral task
behavioral1
Sample
ad525fa6f2ab86ac9da6c744346ed0ae18af490ba3411a88ebb116891f65f3b9.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad525fa6f2ab86ac9da6c744346ed0ae18af490ba3411a88ebb116891f65f3b9.doc
Resource
win10v2004-20220812-en
General
-
Target
ad525fa6f2ab86ac9da6c744346ed0ae18af490ba3411a88ebb116891f65f3b9.zip
-
Size
4KB
-
MD5
41ee239eadfb2d7dc082d75bd65a97d0
-
SHA1
ea358716bdb8298818cb97666ee1436c74069461
-
SHA256
42a85ce6fcf1fa98c0521d55f9fbe118aacf2b2910368cf3aaaab32c5cf1bac7
-
SHA512
0b29d83f936f4161a477f0cd1214ba74456b0f0132c762cbf841c6cb123cedf500e5ffb004d4fc8b0b270f6ae347d80aad85d5da5125f0901a37214a43faeda5
-
SSDEEP
96:lMH6vGtAWAXYGVD+XKZLx1KYgxf+q34SLIdhNcdv+WY6JQ:6H2nX/eSL8xf+fZhOv1Y6i
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/ad525fa6f2ab86ac9da6c744346ed0ae18af490ba3411a88ebb116891f65f3b9 office_macro_on_action
Files
-
ad525fa6f2ab86ac9da6c744346ed0ae18af490ba3411a88ebb116891f65f3b9.zip.zip
Password: infected
-
ad525fa6f2ab86ac9da6c744346ed0ae18af490ba3411a88ebb116891f65f3b9.doc .ps1 windows office2003