Behavioral task
behavioral1
Sample
bdf171c64908d885be311446577582133024b159936b3a6fb233b4b6eb955ac0.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bdf171c64908d885be311446577582133024b159936b3a6fb233b4b6eb955ac0.doc
Resource
win10v2004-20220812-en
General
-
Target
bdf171c64908d885be311446577582133024b159936b3a6fb233b4b6eb955ac0
-
Size
59KB
-
MD5
e9e4eca2571b70a4056535f990451cc2
-
SHA1
f1d9b5d4ed11dc8ad4357d0263128d92fdd19cb0
-
SHA256
bdf171c64908d885be311446577582133024b159936b3a6fb233b4b6eb955ac0
-
SHA512
bbc51ed4e32b5d0f4c12eb44da0cb701478e674f800c521ccb13510e554b15e6ab409ba695e6a0d0656162c585b9a89a9e724b7aba0c6ef797a7e1681303a0bc
-
SSDEEP
768:/s42D3EOXDqYxs1RvC6NB4pO1cUdn9P7P4PaPQqj3Y2uh:N2D3EOz7x0B4pNU9raaP/3x
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bdf171c64908d885be311446577582133024b159936b3a6fb233b4b6eb955ac0.doc windows office2003
ThisDocument