Behavioral task
behavioral1
Sample
XU33264555972999FA.doc
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
XU33264555972999FA.doc
Resource
win10v2004-20230220-en
12 signatures
150 seconds
General
-
Target
Otaamerica_XU33264555972999FA.zip
-
Size
656KB
-
MD5
4a1bd9155f16bd5fbc808ff11eecdd3e
-
SHA1
c6d28f3a9538ac4d77cf5cc8578046b4fd333003
-
SHA256
55a38edaf906ad1fc3fdd712daff438588602a71178f96d11b159231e4543e36
-
SHA512
76d03c99dd99ff6acc9deb0377be04d03442c1c7a5e02035a60b480649022344f701894da9988f7467408dcad6743d71941d8fc8753898f0022729d4672f3b68
-
SSDEEP
6144:QJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqz:0bPHom8TYyCT8x5I5wK
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/XU33264555972999FA.doc office_macro_on_action -
resource static1/unpack001/XU33264555972999FA.doc
Files
-
Otaamerica_XU33264555972999FA.zip.zip
-
XU33264555972999FA.doc.doc windows office2003
ThisDocument
Module1