Behavioral task
behavioral1
Sample
b810d4eaa1756399a5138c5d1def0abcbe8664b58e8d1a590678a53a816a7348.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b810d4eaa1756399a5138c5d1def0abcbe8664b58e8d1a590678a53a816a7348.doc
Resource
win10v2004-20220901-en
General
-
Target
b810d4eaa1756399a5138c5d1def0abcbe8664b58e8d1a590678a53a816a7348.zip
-
Size
13KB
-
MD5
5d67a97fcfc98dd6e6df31805a591585
-
SHA1
29ea65b999e06c3d5a4431548ab2db2e9deab7a4
-
SHA256
a6192087df4fe1434451f0ac2f082936b663f51ca426554c5a738a8abac837b7
-
SHA512
f7616c523153fdc031e29569db67b2c09d36ea786abbb6ef05399b52e360fb38908c90de11bbd5851fff4e48b900d6d1d07e0352fb9f03f142dec83862206860
-
SSDEEP
384:qWlRKQPv8lQoPIao9w0qU5/XGSfYXJsbFLVT5f8YlsTWc:qI93Ay7TqyEJsfVnlSZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/b810d4eaa1756399a5138c5d1def0abcbe8664b58e8d1a590678a53a816a7348 office_macro_on_action -
resource static1/unpack001/b810d4eaa1756399a5138c5d1def0abcbe8664b58e8d1a590678a53a816a7348
Files
-
b810d4eaa1756399a5138c5d1def0abcbe8664b58e8d1a590678a53a816a7348.zip.zip
Password: infected
-
b810d4eaa1756399a5138c5d1def0abcbe8664b58e8d1a590678a53a816a7348.doc windows office2003
KMTF_quotations_template
WS5
Module