Behavioral task
behavioral1
Sample
macroblaster_hell.doc
Resource
win7-20220812-en
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
macroblaster_hell.doc
Resource
win10v2004-20220812-en
9 signatures
150 seconds
General
-
Target
macroblaster_hell.doc
-
Size
206KB
-
MD5
8b78288e524c24018e9c9640c08a2997
-
SHA1
2e6a9ab298a0c0a792bc30d4aa53120326580ffb
-
SHA256
c7770d28d063a64fdd70d3a3b4d63a4cf392a80ee04207613c45e4d20320f9a9
-
SHA512
dce6bbc962c36fed58bd5e4888adc0d7437484cf3e057c33eeb503b9e376bf9608fa465da033308388cd85a7b97177a406ba39ea20d4e7f24b1d1252f2731ac9
-
SSDEEP
6144:rDi6LFVm1l5kgVAFUNAksqezIw1t2rKD5b:a6d0DAbx1ts
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
macroblaster_hell.doc.doc windows office2003
S2lnn14aba1hpaa9x
H461d7l61zdld9s
Tv9c3eri30mt67bpw