Behavioral task
behavioral1
Sample
08231 (Electric).doc
Resource
win7-20230220-en
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
08231 (Electric).doc
Resource
win10v2004-20230220-en
4 signatures
60 seconds
General
-
Target
2023-3-8-e9863e9613552eb695b6f644f0c9ba4d.bin
-
Size
631KB
-
MD5
e9863e9613552eb695b6f644f0c9ba4d
-
SHA1
552fd1c150ba73dd4d356f102a39a10ed795a1b9
-
SHA256
d30d5b4aca7097dde1ae7acf6dbc004dd1f3cb529c266e3d36785a049131dfbe
-
SHA512
95ce71839d6f609d7bd701a39afefcb5c64341baf30db06b1897ef7ba23df22f4a7dab9dd77d461c7804eef57dbb3f38f9d34d87da342b89ba3a480e1bff02fb
-
SSDEEP
3072:l1lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3CB:l12c/z4a5GLNIp1WMkd3tCB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/08231 (Electric).doc office_macro_on_action -
resource static1/unpack001/08231 (Electric).doc
Files
-
2023-3-8-e9863e9613552eb695b6f644f0c9ba4d.bin.zip
-
08231 (Electric).doc.doc windows office2003
ThisDocument
Module1