Behavioral task
behavioral1
Sample
bf757d55d6b48ec73851540ca7fe9315.doc
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
bf757d55d6b48ec73851540ca7fe9315.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
bf757d55d6b48ec73851540ca7fe9315.bin
-
Size
66KB
-
MD5
bf757d55d6b48ec73851540ca7fe9315
-
SHA1
8a50a4ee479d9ba2f5525fa899420b30296e3ed8
-
SHA256
12ecabf01508c40cfea1ebc3958214751acfb1cd79a5bf2a4b42ebf172d7381b
-
SHA512
8a20f267776371d3e98b4e602368b9be6b9a62a232f9e002d406f11fac0997976ba1feb6768dc0a5780824a459190858b38c8dd7c5c4102ee01f13d42a1c6fff
-
SSDEEP
768:ovVmKcBTfstCvh3NMtBILB6+t8+ltAsrwzMx3nS:eAKTinDLB6+t8+TAsrwzMJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bf757d55d6b48ec73851540ca7fe9315.bin.doc .vbs windows office2003