Behavioral task
behavioral1
Sample
b2c13a3b44ba21ea99f2049dc25a5ddf9e7f9ecdb7c9d9b4916faa13da81e0b1.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b2c13a3b44ba21ea99f2049dc25a5ddf9e7f9ecdb7c9d9b4916faa13da81e0b1.doc
Resource
win10v2004-20230220-en
General
-
Target
b2c13a3b44ba21ea99f2049dc25a5ddf9e7f9ecdb7c9d9b4916faa13da81e0b1
-
Size
1.2MB
-
MD5
18988ba1657599473b89c99227648121
-
SHA1
f4c8aa8b62636b4edfe3417969660c6c07a59999
-
SHA256
b2c13a3b44ba21ea99f2049dc25a5ddf9e7f9ecdb7c9d9b4916faa13da81e0b1
-
SHA512
5186dca2a08ce5915e7518f83bbd4f1a23edbe60a47349202bf2a20e4b0dd6de6d8dfa531b87950a2a5775b03ad91fbe2418fd27da63991c40a9805eed19ba78
-
SSDEEP
24576:aylhPu5PQbNxP2l3PTCUMOv8vUs/S0yAtAG4DuN7ioiTfcS5hJ2nt:achW5PQhlOPTHVkUR0y8AG4DuN7ioqcv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b2c13a3b44ba21ea99f2049dc25a5ddf9e7f9ecdb7c9d9b4916faa13da81e0b1.doc windows office2003