Behavioral task
behavioral1
Sample
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm
Resource
win10v2004-20230221-en
General
-
Target
10165347684.zip
-
Size
755KB
-
MD5
4f35493c8d8bd8ed6a65fc25835ef53e
-
SHA1
e12967826da0d43cfe74d4e4744728cc4983f6f6
-
SHA256
e04a2483f9f0609459ed3af166aefee5fd141be0add7654998698882a57ad9e7
-
SHA512
fa2ad5da68f6635943ba30b6d2066b8749008873969cacdfddfe4dde08d937f7bcfff772970b7abb3e8ba67a600110529e733c21f1773e7c29aac5f7edffccdf
-
SSDEEP
12288:7gLDxQEaOXmzSDm/KQkIRoLnzp+lyNHp4eU8xZX3c+9KIWPDGyzbOGg8Bkg/5J8t:7gL9h9QkIR0nzfNJ4t8xZX3TreGyzblu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c office_macro_on_action
Files
-
10165347684.zip.zip
Password: infected
-
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm office2007