Behavioral task
behavioral1
Sample
2c874b09f38665a7e9677a449a13142067678c846d85d806fa1f9fba4600a8df.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c874b09f38665a7e9677a449a13142067678c846d85d806fa1f9fba4600a8df.doc
Resource
win10v2004-20220812-en
General
-
Target
2c874b09f38665a7e9677a449a13142067678c846d85d806fa1f9fba4600a8df
-
Size
55KB
-
MD5
0e631512f381439b5b2cc80554c4e615
-
SHA1
8518f6c284ac65a454cd257bb09caeb52b53f61a
-
SHA256
2c874b09f38665a7e9677a449a13142067678c846d85d806fa1f9fba4600a8df
-
SHA512
8bbd4362febd1d54e145e5460a363eced92d25162755e1bffc9095d4beb0da42a43044cecb3b3f21d6dd17acf7aef595e2ecccd6bfe20542923510915b4657a8
-
SSDEEP
768:qCwRGg5CyHxNv5W/X+PAPoNuPS6YhK62wI4H+Hjjz2TnX5U9:qH6yHxAPoNuPj+TH+b2r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2c874b09f38665a7e9677a449a13142067678c846d85d806fa1f9fba4600a8df.doc windows office2003