Behavioral task
behavioral1
Sample
2023-3-8-4dc2e61df89b282c986cc2ad3b3d27a9.zip
Resource
android-x64-20220823-en
0 signatures
150 seconds
General
-
Target
2023-3-8-4dc2e61df89b282c986cc2ad3b3d27a9.bin
-
Size
624KB
-
MD5
4dc2e61df89b282c986cc2ad3b3d27a9
-
SHA1
0aa0ac2bf304ff2afd4c1b0a074725965393edff
-
SHA256
1aafdf5588061196b7dadba7a7d3919fa6cd0790abc07aa45d5e9ee5e2e86397
-
SHA512
f351daa64b1f1d1a82018444e207cf73e7c14cd7b83bf9f8c3ae126dd529dc498fffaad46c94a8bfae39a7c4b3acbefde319eb48e7cfc5d2bf70576c998e8b2d
-
SSDEEP
3072:X1lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3C7:X12c/z4a5GLNIp1WMkd3tC7
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/K-1 03.07.2023.doc office_macro_on_action -
resource static1/unpack001/K-1 03.07.2023.doc
Files
-
2023-3-8-4dc2e61df89b282c986cc2ad3b3d27a9.bin.zip
-
K-1 03.07.2023.doc.doc windows office2003
ThisDocument
Module1