Behavioral task
behavioral1
Sample
01103105021645dedc763038bbab6aa793dae9b1777c8a821009a5d0538f9e57.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01103105021645dedc763038bbab6aa793dae9b1777c8a821009a5d0538f9e57.doc
Resource
win10v2004-20220812-en
General
-
Target
01103105021645dedc763038bbab6aa793dae9b1777c8a821009a5d0538f9e57
-
Size
38KB
-
MD5
0b68df97166619fc028e243ed72c4b30
-
SHA1
bb26358fb3dc6428f2ff68c09febc7ba5fd51925
-
SHA256
01103105021645dedc763038bbab6aa793dae9b1777c8a821009a5d0538f9e57
-
SHA512
6e24eccc3ccaa92a48db0897e6c803ca7588ea5a9887ba5dcb74caf727065d7b455edc9502a85819005acebd7ab0cbe57771175669f6b72357a7263fd9a089d8
-
SSDEEP
384:EnQAZ6iSZfI/PKRNikQHk606jEFAtFmRnTYU460j+:E1ZCAPon6jELj7V
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
01103105021645dedc763038bbab6aa793dae9b1777c8a821009a5d0538f9e57.doc windows office2003