General
-
Target
example01_EvilClippy.doc
-
Size
28KB
-
MD5
bb0b672e7e908e6a77bfb4f0d445a187
-
SHA1
7b44eb093b20846cd3570c01e003399d6476e9eb
-
SHA256
16c21bf10a1c072d89e3c838dc00b0c6a35627f1187e67a32403d3c9a89dcf28
-
SHA512
fc166cc8bf226e13ce5c97f1eef9fe150cdae48dc49f2120d686ed3a05b3f238efc2eb7722498b3ea72012629776570f7104bebfa871d26d80ac59747b5e0d8e
-
SSDEEP
192:1IlLZEvA+6/6rNavrgYjk+4bWlnrPt1IjL50juNxfafMd:1E8iSwvxjk+tnLt2f50juH7
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
example01_EvilClippy.doc.doc windows office2003
ThisDocument
NewMacros