Behavioral task
behavioral1
Sample
MatHax-Client-Fabric-1.19 (1).jar
Resource
win7-20230712-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
MatHax-Client-Fabric-1.19 (1).jar
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
MatHax-Client-Fabric-1.19 (1).jar
-
Size
24.2MB
-
MD5
cd0139eb072d000c95c54d47fdd66aaa
-
SHA1
1be6fdc2230c6af3046ac9648656f2442567a92d
-
SHA256
d43ffe2bce5ff306a851adcb3fe263585f28bfcbd9c3b12f785f06c5b0b289d2
-
SHA512
042858b63ee5ddad6ee118e562d1fe252e5a2a20cc9eece64f9bcdc87d45d3f7de64bbab3ff25038b2629140d615d0ba13419157a8a7aa15b5e01713708d5079
-
SSDEEP
786432:fWbKQTh5DUaCRF+2vf1b1jqcDpHlVpuQP+zQ:6H3Dl2H1bkcppdD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
MatHax-Client-Fabric-1.19 (1).jar.jar