Behavioral task
behavioral1
Sample
82379201f4fede9eddba613062add6804c1d241b8830e142812a71ea40defb65.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82379201f4fede9eddba613062add6804c1d241b8830e142812a71ea40defb65.doc
Resource
win10v2004-20220901-en
General
-
Target
82379201f4fede9eddba613062add6804c1d241b8830e142812a71ea40defb65.zip
-
Size
4KB
-
MD5
cadebcd2fed7b3c8c74b0e3ed2837437
-
SHA1
b3234d50a5515ae8c4f7ad80fa26f600e2029ce5
-
SHA256
85ebda4cba2370a129d0f9f609053d765c3bd234a98bce975209776fd7928905
-
SHA512
c5d7779e76c2f5253f4cf0598ea9b47d70b95e59aaef3fbf885771c99ece854f3d4a81293d251c46b2798a33ff3e75a1f7f47583a7376e8f3ad41a2e9db47a4e
-
SSDEEP
96:l1lsXUn9bIMdZ90og8uGJGVt3KQSusmr7j/5KIvj1h22KsukOV82Onut1:jWXs9b1dZ9vgvGJGVdkus27jIIZh2SYr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/82379201f4fede9eddba613062add6804c1d241b8830e142812a71ea40defb65 office_macro_on_action -
resource static1/unpack001/82379201f4fede9eddba613062add6804c1d241b8830e142812a71ea40defb65
Files
-
82379201f4fede9eddba613062add6804c1d241b8830e142812a71ea40defb65.zip.zip
Password: infected
-
82379201f4fede9eddba613062add6804c1d241b8830e142812a71ea40defb65.doc windows office2003
ThisDocument