Behavioral task
behavioral1
Sample
5ba0d90d3978a28861d8af87bae60c5fe3e0967286f14c844e7c56d73e8d71d3.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ba0d90d3978a28861d8af87bae60c5fe3e0967286f14c844e7c56d73e8d71d3.doc
Resource
win10v2004-20221111-en
General
-
Target
5ba0d90d3978a28861d8af87bae60c5fe3e0967286f14c844e7c56d73e8d71d3
-
Size
16KB
-
MD5
b114260268633a8436c3e802c32d376f
-
SHA1
a49ae927ce1204a959f49eb041f8e6fcad9f3ea3
-
SHA256
5ba0d90d3978a28861d8af87bae60c5fe3e0967286f14c844e7c56d73e8d71d3
-
SHA512
7680abce72d3158f080d560085c51d84f348406d16a5309042cfeef52dd77d6748431681049206591673f9e6e8c154ac0e1ecf921fd454d0674652c8b33e8440
-
SSDEEP
192:FQ6eZ3VHpLyYyBosDsvZxtC5WYS8Ya9Ca43:F27HofBox/j8Yaa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5ba0d90d3978a28861d8af87bae60c5fe3e0967286f14c844e7c56d73e8d71d3.doc windows office2003
ThisWorkbook
Sheet1