Behavioral task
behavioral1
Sample
e0edb40174d1d3c9f931b3df74ba8f3ab5e1c7e7690de5a318acd2ab7dd0ae5c.doc
Resource
win7-20230220-en
6 signatures
150 seconds
General
-
Target
10125555945.zip
-
Size
56KB
-
MD5
a067ea507cff24f1dfc0b0637b552271
-
SHA1
ad2783c0802b99cef76da1d4e818c5d71160ebaa
-
SHA256
d57dcaec09dbc5a94d22f51064f6babfdb644fdde419a8662f8860b83e15d71c
-
SHA512
3541787723d1e3894fe757830b35e4823dd751ce68a9630ba8ac338acf24e0bc3d890a214b31a6d9a83e6a707398d9df4fb0bd4f0a3eff9a31e7a85c8519b02c
-
SSDEEP
1536:ql4ccFcmVg/fUgCf8VGYamqZysz0ajBtzKPNTpwy:Y4r7Vg3Cf8VG4qZ19jnKPNd3
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/e0edb40174d1d3c9f931b3df74ba8f3ab5e1c7e7690de5a318acd2ab7dd0ae5c office_macro_on_action
Files
-
10125555945.zip.zip
Password: infected
-
e0edb40174d1d3c9f931b3df74ba8f3ab5e1c7e7690de5a318acd2ab7dd0ae5c.doc windows office2003