Behavioral task
behavioral1
Sample
e906da80c39e036a47c9c6456e064d708e6202412930bea0a24181ab71430494.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e906da80c39e036a47c9c6456e064d708e6202412930bea0a24181ab71430494.doc
Resource
win10v2004-20220812-en
General
-
Target
e906da80c39e036a47c9c6456e064d708e6202412930bea0a24181ab71430494
-
Size
76KB
-
MD5
a8a0ae737a9d62baafae4708442fe71e
-
SHA1
1fec0c3e5419f433ee9d9c508db5657c5dacf634
-
SHA256
e906da80c39e036a47c9c6456e064d708e6202412930bea0a24181ab71430494
-
SHA512
5e11b76f7f417fddd077f3671463fef986e7afdca718115e81633a5cdeac0fe1bbad2e3baed2b98ead91dca5e6f8e475881d159d26b72fc9dbf5f4db02f2f837
-
SSDEEP
1536:KBkwUsRY++6MS6gUAPo1BtiXYPFNYYDj3E:2UsRY++/DAqDiXY6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e906da80c39e036a47c9c6456e064d708e6202412930bea0a24181ab71430494.doc windows office2003