Behavioral task
behavioral1
Sample
2cbf6d66c8c3942e9e5fae411a4301af4f2594f174c804aed74c13937e84cc8b.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2cbf6d66c8c3942e9e5fae411a4301af4f2594f174c804aed74c13937e84cc8b.doc
Resource
win10v2004-20220901-en
General
-
Target
7984706135.zip
-
Size
332KB
-
MD5
47812267ff3313a55735726e6a197d79
-
SHA1
7d6866e4c34d53bdad0432d61deb2c951ee2361b
-
SHA256
0a6e58fe72cc01521f7bd80df649c7aa5a36d4151ca6ac563eba0a7efd585104
-
SHA512
56eb209d03b8c333c23ed714533de3df91f0c383a74442283677146d56a47a48b3ff0c17d07be2077cda4763e25953e668d9dd762bcba5235ab2eb8d18c352f6
-
SSDEEP
6144:cgQ/ipifkm1wuU5+JO3fYwq6A4UeceVY1uyUUCHywCTTx0QslRtuHTuPLGbhYSDO:s/2m1wuHo3fxrVStWRmF0QslguPC9dcT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2cbf6d66c8c3942e9e5fae411a4301af4f2594f174c804aed74c13937e84cc8b office_macro_on_action -
resource static1/unpack001/2cbf6d66c8c3942e9e5fae411a4301af4f2594f174c804aed74c13937e84cc8b
Files
-
7984706135.zip.zip
Password: infected
-
2cbf6d66c8c3942e9e5fae411a4301af4f2594f174c804aed74c13937e84cc8b.doc windows office2003
ThisDocument