Behavioral task
behavioral1
Sample
b57017f523b98fbedde74ad1969bbf67136f91ad53bc2b2b24970c096a48102f.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b57017f523b98fbedde74ad1969bbf67136f91ad53bc2b2b24970c096a48102f.doc
Resource
win10v2004-20220901-en
General
-
Target
b57017f523b98fbedde74ad1969bbf67136f91ad53bc2b2b24970c096a48102f.zip
-
Size
12KB
-
MD5
a19dbf769d26a4542f9c22d52fc61b8e
-
SHA1
ae566dae6140a43e392a4a3a8ec8f18247046a26
-
SHA256
407c962bd8191dfcfcd43c7a61dd8bedb82ecd5351cc9e6c983ca21bfffe26b4
-
SHA512
554741ce134fc2b43ab0d9354f50ebadabd8a93f403e7d2bf5d9e4de35a2410589143f8f5c7f6a34d9756d1c6e5771a6a72d5e1371bf7b110057bc318e218608
-
SSDEEP
192:oyx2QclvcU/wnBY1aa7/LzxWNrx5U81kfoB7JZSKAyTTrveooHyV0K:oywnnaBcTLzMrxS0kfoB7ZZvrmyqK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/b57017f523b98fbedde74ad1969bbf67136f91ad53bc2b2b24970c096a48102f office_macro_on_action -
resource static1/unpack001/b57017f523b98fbedde74ad1969bbf67136f91ad53bc2b2b24970c096a48102f
Files
-
b57017f523b98fbedde74ad1969bbf67136f91ad53bc2b2b24970c096a48102f.zip.zip
Password: infected
-
b57017f523b98fbedde74ad1969bbf67136f91ad53bc2b2b24970c096a48102f.doc windows office2003
ThisDocument