Behavioral task
behavioral1
Sample
49e50e340bf9853d39d8b4d626530b234abfb15e620a39cf3d76ef844d5f540a.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
49e50e340bf9853d39d8b4d626530b234abfb15e620a39cf3d76ef844d5f540a.doc
Resource
win10v2004-20220812-en
General
-
Target
49e50e340bf9853d39d8b4d626530b234abfb15e620a39cf3d76ef844d5f540a
-
Size
88KB
-
MD5
12d736b9d5a547625852212c12b6c6b2
-
SHA1
8593abb0784bb2375d19098cb696e75c9946637d
-
SHA256
49e50e340bf9853d39d8b4d626530b234abfb15e620a39cf3d76ef844d5f540a
-
SHA512
4e093762e22a02160f3052a24d642e9d7112342c4aa1ba70db7e6d55a0c7d7d656efaac81ec808c9257788ca6df0d8ecfcf482605c7e73841d9f195bac77dcc8
-
SSDEEP
1536:QIgjEKcnXHbg27dPsF6pf+AFRGzfBqMCDM3316YADJ76Sv6u09P:QIgjEKcnXHc25kETFRG9Z17M6Sv6u09P
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
49e50e340bf9853d39d8b4d626530b234abfb15e620a39cf3d76ef844d5f540a.doc windows office2003