Behavioral task
behavioral1
Sample
b5eeabc7ae7a20bccaac6cd45d0ebaf776ddd257e252447bb4148d1ee2d92baf.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5eeabc7ae7a20bccaac6cd45d0ebaf776ddd257e252447bb4148d1ee2d92baf.doc
Resource
win10v2004-20220812-en
General
-
Target
b5eeabc7ae7a20bccaac6cd45d0ebaf776ddd257e252447bb4148d1ee2d92baf.zip
-
Size
20KB
-
MD5
a44013904ec59609ca5edfcc6af5f698
-
SHA1
d24a5016f8fcaa7437a087322ea7d9066fc800c0
-
SHA256
90a62fe96fbf0697ea86a5c656cd409915aa87c27c1e60871b68b4895d6e2be3
-
SHA512
4e50112ebc16d72fc3527a02f1a695b5de8307054e54fdeaad224b02cb93f2c18ab8c32f27202f58a0f985cbb5a535a0101b59904659dfa7dc1b9064df0a7300
-
SSDEEP
384:+W6sPqZf2THdP2PKi7r0x5qEK9t6VnkAz6lj/:+W64qB2ZW+qEgt6VPq/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/b5eeabc7ae7a20bccaac6cd45d0ebaf776ddd257e252447bb4148d1ee2d92baf office_macro_on_action -
resource static1/unpack001/b5eeabc7ae7a20bccaac6cd45d0ebaf776ddd257e252447bb4148d1ee2d92baf
Files
-
b5eeabc7ae7a20bccaac6cd45d0ebaf776ddd257e252447bb4148d1ee2d92baf.zip.zip
Password: infected
-
b5eeabc7ae7a20bccaac6cd45d0ebaf776ddd257e252447bb4148d1ee2d92baf.doc windows office2003
ThisDocument