Behavioral task
behavioral1
Sample
Your_Receipt_1146_EvilClippy.doc
Resource
win7-20230220-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Your_Receipt_1146_EvilClippy.doc
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
Your_Receipt_1146_EvilClippy.doc.zip
-
Size
136KB
-
MD5
a6ea537492812eb779006ebb39fa5121
-
SHA1
558c1f259d63ea1a22ac6a0068e3a14a80d4c535
-
SHA256
b3a1b9717659967a765a49ea1ff77b9a0cd03e7da2932de389118d471cd99d7c
-
SHA512
ca73abc45f74bb189a196cda537cc0c1e35d6b441503e3b135233f5cde78ab224a306bf94c850df778cc642662c357452c775ce9f487a11153459e73562df954
-
SSDEEP
3072:d/SyXkjS0LeyT/F3QhRrMPvYyk2lATIyZqQ6QzKVPk4li5McowElgch:PXkb7T+EgyCIyZquePVi5ZEGG
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Your_Receipt_1146_EvilClippy.doc office_macro_on_action
Files
-
Your_Receipt_1146_EvilClippy.doc.zip.zip
Password: infected
-
Your_Receipt_1146_EvilClippy.doc.doc windows office2003