Behavioral task
behavioral1
Sample
284803a0435ea310b028092934783a9b71d6ea67e46c115d6b4a43d3ca955ce7.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
284803a0435ea310b028092934783a9b71d6ea67e46c115d6b4a43d3ca955ce7.doc
Resource
win10v2004-20230221-en
General
-
Target
10013031444.zip
-
Size
37KB
-
MD5
716c88d837b3350ed9e8a5083bc3f6a2
-
SHA1
2b705ddacbca2cd23472c99ddd10288303093616
-
SHA256
e75ee361cbb2ad3f65e427b91466f41f2ed8c68a8af833b27ea643c43e6723b5
-
SHA512
f607e3a900e527af5960983c5f9a967c36566846f40ebc61f51d8651d9656cc36244f10aff7cc41f34d82caf7ad1a276b9eeac28478a506ee53b40d1c94c2b6a
-
SSDEEP
768:3ZgAs/6mzN3je70WVZKPwub/Qfd1BIZnT14eW4ZQBN/BQ:3Zps/6s3ud9fdHIZnT1e4+Y
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/284803a0435ea310b028092934783a9b71d6ea67e46c115d6b4a43d3ca955ce7 office_macro_on_action -
resource static1/unpack001/284803a0435ea310b028092934783a9b71d6ea67e46c115d6b4a43d3ca955ce7
Files
-
10013031444.zip.zip
Password: infected
-
284803a0435ea310b028092934783a9b71d6ea67e46c115d6b4a43d3ca955ce7.doc windows office2003
ThisDocument