Behavioral task
behavioral1
Sample
172ef30c265f0e51e2073ac501e39e3e.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
172ef30c265f0e51e2073ac501e39e3e.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
172ef30c265f0e51e2073ac501e39e3e.doc
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
172ef30c265f0e51e2073ac501e39e3e.doc
Resource
win10v2004-20230220-en
General
-
Target
172ef30c265f0e51e2073ac501e39e3e.zip
-
Size
120KB
-
MD5
e5490c0cb35adf024fe29a407f031149
-
SHA1
766873475d2c138d96e49d53a22ff7f36891a6fe
-
SHA256
550b9ce58bf769237e9df5562c91594fa9efca5be6702f739bb15be0b004af56
-
SHA512
66f382677ebdc5bbb2c561a445378aafe624a3909197cfcc1605f0a211acd45344fb990b7c0ed97ab807b8b664a6ee83b2282fa4c1a7cf8dc25c2e327ce718a8
-
SSDEEP
3072:dXAK79qwllclFFBAwbsK/jLZ7tFl+8OuDKdJm3he/EiD8W:BA+qAyBBFxBrlDKnL/Bl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/172ef30c265f0e51e2073ac501e39e3e office_macro_on_action
Files
-
172ef30c265f0e51e2073ac501e39e3e.zip.zip
Password: infected
-
172ef30c265f0e51e2073ac501e39e3e.doc windows office2003