Behavioral task
behavioral1
Sample
16538 (Electric).doc
Resource
win7-20230220-en
12 signatures
150 seconds
General
-
Target
0e1565f445bfbe7eaf28810c9a364588.bin
-
Size
692KB
-
MD5
0e1565f445bfbe7eaf28810c9a364588
-
SHA1
380a87e8960be363d269f724265932e36dff0b74
-
SHA256
ca87dfb7f5da6df6a5a029bfefafd1fb5ca06eced97d75e295594e2cde9264eb
-
SHA512
25997b41e841601380923e04dd0294f5f32ed3c26f2a31db07f36569b4cda89f955d327772c8edad85f5a9a002d5f1cca35e74dd1baa1c76d4764eedb2fe899c
-
SSDEEP
6144:VJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqQ:JbPHom8TYyCT8x5I5wx
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/16538 (Electric).doc office_macro_on_action -
resource static1/unpack001/16538 (Electric).doc
Files
-
0e1565f445bfbe7eaf28810c9a364588.bin.zip
Password: infected
-
16538 (Electric).doc.doc windows office2003
ThisDocument
Module1