Behavioral task
behavioral1
Sample
526f48c6b3b767c119282e362eeb39238ac3593f7b3742eb08e67cd93d913a44.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
526f48c6b3b767c119282e362eeb39238ac3593f7b3742eb08e67cd93d913a44.doc
Resource
win10v2004-20230220-en
General
-
Target
9775229346.zip
-
Size
93KB
-
MD5
936872e5942c5e956aaf2c322a56b886
-
SHA1
47fad16d24d92190efd0630492f5ff92a8ddd876
-
SHA256
88fab66e4eb810b964030070fc64d1f792984263d43a95e167d260f0a9345f2d
-
SHA512
0fb377fd3fbfcbd74dd405de3f33c87ba49ee04893712e307e5892a6de9326cb574b48880bb028ef68fe1029beaaadf355e980de930fab8d2c3e8dabd1c1c645
-
SSDEEP
1536:A7RWERHvw/mg1FUdcsnvL6+BaXQgylzv6M1Ln2V4+U/eWUOjBXCvyZBYGtUwd:yRFRemyC2KTBagggn2pU/eLkBXD7YG+g
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/526f48c6b3b767c119282e362eeb39238ac3593f7b3742eb08e67cd93d913a44 office_macro_on_action
Files
-
9775229346.zip.zip
Password: infected
-
526f48c6b3b767c119282e362eeb39238ac3593f7b3742eb08e67cd93d913a44.doc windows office2003