Behavioral task
behavioral1
Sample
53e94e21bedf9279a36b74f8cc00ef8201d80cc5431666b7640286d97e92fefd.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
53e94e21bedf9279a36b74f8cc00ef8201d80cc5431666b7640286d97e92fefd.doc
Resource
win10v2004-20230220-en
General
-
Target
ed8782f15a5410b1391ea4de8d9fbee3.bin
-
Size
4.8MB
-
MD5
6ae4695068ed637f7fcd794027594e28
-
SHA1
277563a01a75fadb9eac81a321ccc6e901f7f876
-
SHA256
523f1ad314bbdb64a16a4efeb47492cec50d32a5c9b22993ec6d6c605d4ad0b6
-
SHA512
25c5fb5cdb01c614c7b437550d09c188b40fa2f4f35da5c133f98c2620dbe5697f37e7fc700bdac946e5c4066f02d21c974988b4a9a08273e500c8980e73f961
-
SSDEEP
98304:os9f5y9d0mn1cbibB4oDcG3nYPZkqD2lRR8xOUGoZo2fCwo1tgV9E:x3q1+q41G3Il2bR8A8fCwoQVC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/53e94e21bedf9279a36b74f8cc00ef8201d80cc5431666b7640286d97e92fefd.doc office_macro_on_action
Files
-
ed8782f15a5410b1391ea4de8d9fbee3.bin.zip
Password: infected
-
53e94e21bedf9279a36b74f8cc00ef8201d80cc5431666b7640286d97e92fefd.doc.doc windows office2003