General
-
Target
EDR4kgGIhU2cS8Gny8FF45.zip
-
Size
18KB
-
Sample
230712-m8v1vsdh21
-
MD5
06d428e505d788ace5e349d2d5d4507f
-
SHA1
467f9dee5bf386bcd1ccfd9f2530476499e1fec2
-
SHA256
ac8919a58389e1fdb5a8fde14d9451c589ed01d6e84dd8a2e48fe5ba9bd261db
-
SHA512
6078526b705d2184ed3d9e584bd4c8dfca42a43b0e87b80efa1b93803c732167c3cbbda4045ebc0095eb281a6bff57372fc4dfbf7245c92738929141b0945aa0
-
SSDEEP
384:U0uZ2CPx39xM8lnP0UFU6FarwvU/+TT7wCrwqdFZccJIGORYwF:U0W2Utx/xxRFDwCrwLsQR1F
Static task
static1
Behavioral task
behavioral1
Sample
sysrar.doc
Resource
win10-20230703-en
Malware Config
Targets
-
-
Target
sysrar.doc_
-
Size
36KB
-
MD5
7f447856ffce83300397a38af2fafb09
-
SHA1
308af1464252d8a3274d1d5ee3fde0decf321728
-
SHA256
903eda2289b5fccc26aaf44a2b7ffbcf1b48ba3b81f7095698a7a42f208c7984
-
SHA512
c9f79f23ebd0abab989678fa5b2ab94f444b536001be4d687e4360631d4a7f3938d20fbc17d1995a8b90599b004fd77e40b73de5887f3eb7cc1b14e79d9a3809
-
SSDEEP
384:JDU1iSX3mSBqEIXxsjkev1a8MD32suJcXNBB3Su0jijm:5uqzBs4evozD32JJcXLEud
Score8/10-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-