Behavioral task
behavioral1
Sample
2a36f4f8d0bd6b9c48e6d7767ab2408e52a3eac20809e22b42b09130c4d9e662.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2a36f4f8d0bd6b9c48e6d7767ab2408e52a3eac20809e22b42b09130c4d9e662.doc
Resource
win10v2004-20230220-en
General
-
Target
876305f36263bd3a515da037981f0f36.bin
-
Size
270KB
-
MD5
e1910ba8304803f0e62d1dda703fa465
-
SHA1
351d0ca03a1de749c0e0ea020f1a75e737785754
-
SHA256
b27cd07261064e0ab2dbc66c104426b6037ee3379f4aa3685f58b4b7aab0302d
-
SHA512
e7c7b4902c69c942b00b0ddad215d7c315439fed5e338e107534c5a99b67f6b88410e79ee89bab830a63a5a1310bdc89398ebbdc6ef50f8935f434dabc0200c0
-
SSDEEP
6144:JAf6MAD7sou3u4hEaZ9/ktl7DF9s2LxBateiCVi9:mfzAMoue4hRZ9+l7DF9jDatei4i9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2a36f4f8d0bd6b9c48e6d7767ab2408e52a3eac20809e22b42b09130c4d9e662.doc office_macro_on_action
Files
-
876305f36263bd3a515da037981f0f36.bin.zip
Password: infected
-
2a36f4f8d0bd6b9c48e6d7767ab2408e52a3eac20809e22b42b09130c4d9e662.doc.doc windows office2003