Behavioral task
behavioral1
Sample
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm
Resource
win10v2004-20230220-en
General
-
Target
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.zip
-
Size
759KB
-
MD5
50c70ddcb64d2e8ddd2bc87ec70f4272
-
SHA1
f861efa09efe1c1920c71eb7ed8b0a34d48116f0
-
SHA256
9ebbbe646489328d8777a8d4eaab74f49e657b4c5445cc46c967c0718254ad24
-
SHA512
3ad1949fa9c2f255b16b17bab37e3e4d45feb7844c5e90764f0964544dcd5030201478daf6c66059913769dabc0a4811077c845db22946016ba64fedd8ff9c93
-
SSDEEP
12288:IctgifVSOyA/W6QOREIQn5t7yXkBO9LKAZglXhycg:Ifsf/W958XFKAaly
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c office_macro_on_action
Files
-
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.zip.zip
Password: infected
-
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm office2007