Behavioral task
behavioral1
Sample
2ffb08e74dd1529e3d1e2eca9ce81e65bcf4dd360c8825dbe4c6905f46b039e3.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ffb08e74dd1529e3d1e2eca9ce81e65bcf4dd360c8825dbe4c6905f46b039e3.doc
Resource
win10v2004-20221111-en
General
-
Target
2ffb08e74dd1529e3d1e2eca9ce81e65bcf4dd360c8825dbe4c6905f46b039e3
-
Size
789KB
-
MD5
9c878d95d08aa3083f2e9cb9c80472ed
-
SHA1
368350f1d39a016044ad687116075a6efb118f92
-
SHA256
2ffb08e74dd1529e3d1e2eca9ce81e65bcf4dd360c8825dbe4c6905f46b039e3
-
SHA512
1f5f720f186aa16348d65f42e99efbb5574f26d5a9344befc3094b2dd6b14d3f06670851cc006defd615673c2975b50bfdc3a96ba9666845a3ce92946a9ccc02
-
SSDEEP
24576:SJkibpcQbQCkfWjbPZOdVEVqpjoaIRqmWHc6:SJkibpcQbQCkfWjbP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2ffb08e74dd1529e3d1e2eca9ce81e65bcf4dd360c8825dbe4c6905f46b039e3.doc windows office2003