Behavioral task
behavioral1
Sample
24b371a0da31197edd19a36f3d258f236cdea20f708c0cd5ad7c84f99ebd76c9.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24b371a0da31197edd19a36f3d258f236cdea20f708c0cd5ad7c84f99ebd76c9.doc
Resource
win10v2004-20220812-en
General
-
Target
24b371a0da31197edd19a36f3d258f236cdea20f708c0cd5ad7c84f99ebd76c9
-
Size
233KB
-
MD5
49e7298b31882c44ecea54800fa2ff51
-
SHA1
d380c2260794193a738d4f8bba11bdb42de185bd
-
SHA256
24b371a0da31197edd19a36f3d258f236cdea20f708c0cd5ad7c84f99ebd76c9
-
SHA512
e3af3e39502b7fba22d989ab818f36cba38a1c39df521c3f128965ca1ebc358dab8e8bd99a6b8f7c5287a5a85893692cff60d74771522a7acab4fefbeac7ae43
-
SSDEEP
3072:9lwmjgR2VUAIVNM49spw7uzeJq+oqZSqf4nU5uW:9lDgyUrk49awDJhoeSNnD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
24b371a0da31197edd19a36f3d258f236cdea20f708c0cd5ad7c84f99ebd76c9.doc windows office2003
ThisDocument
Module1
Module2