Behavioral task
behavioral1
Sample
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.doc
Resource
win10v2004-20220812-en
General
-
Target
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.zip
-
Size
14KB
-
MD5
0bae68a728a2924882925d42c4137ee0
-
SHA1
e52d385c9074d417295022a57449d3b33ebf76b7
-
SHA256
7fd0af29afe17cd0719abf5c40ebc97ba21b90f49bc3989482821227e39d92c2
-
SHA512
6e6b747596641a64c9c00ad2f161b69b01d35fae17b0302cb906f46da81147c72115eebef4bf6f05747741460db09f3eedb82eaf28cdd164f51194ec8d98505e
-
SSDEEP
192:6V5QBvCDUeMg1TNTPe3/2Fx2BWdl7HoNFe5sPxAACJDFYH9zkB2qBlKTd4sX+jTW:6VAjU26xD0K5bbFAzkBhlKisOjcOI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4 office_macro_on_action
Files
-
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.zip.zip
Password: infected
-
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.doc windows office2003