Behavioral task
behavioral1
Sample
Sbp.org.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Sbp.org.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
693478268653183357348339434__2023-08-03_1738.doc
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
693478268653183357348339434__2023-08-03_1738.doc
Resource
win10v2004-20230220-en
General
-
Target
Sbp.org.zip
-
Size
629KB
-
MD5
d886f3a6a46c07edda63bd4b0e6e156b
-
SHA1
3640c707abb9b59f40052fb7ec114b396a858d14
-
SHA256
a7353648595a6565ed912ed2123fc1c8e150dd833f6efae8b766b676e477bbf6
-
SHA512
b90647b1e09fe8f1a4ac6f403e0d08470ef4145df50c603d0b1eaffe13cc25fab339c45dcee97508b2ecbf2bc45266df133d20693a8bbb97f6adf228415e9075
-
SSDEEP
3072:ahJUQOy7sIOr5NdgQBcU3IIGoMXjPvzL/QbY:ahi+sI+5NqQXqLvnd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/693478268653183357348339434__2023-08-03_1738.doc office_macro_on_action
Files
-
Sbp.org.zip.zip
-
693478268653183357348339434__2023-08-03_1738.doc.doc windows office2003