Behavioral task
behavioral1
Sample
6dba4e86890eae79346c286603f5e713.doc
Resource
win7-20230712-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
6dba4e86890eae79346c286603f5e713.doc
Resource
win10v2004-20230703-en
9 signatures
150 seconds
General
-
Target
6dba4e86890eae79346c286603f5e713.bin
-
Size
4.0MB
-
MD5
6dba4e86890eae79346c286603f5e713
-
SHA1
0300c0a2797af87aa6938181a971291a4ea0163f
-
SHA256
2273e2456c292a557c5d220eb7f7cdd62d7b33427fd97bb0efc9d102137d7dd6
-
SHA512
6e82fb67f5247429f99fc0381b16fbc51b235bd748738dd6aad774a4d4517987787f301a89fd683de408eceba69d2be2f578caf249df466dcc8ea38e7559b32e
-
SSDEEP
49152:TvXaVAMPLfOyim8iTrN5I+KmHF6G6kjcq/flLIa/IbNt:TyVAwi8l/HFL6icS0Nt
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6dba4e86890eae79346c286603f5e713.bin.doc windows office2003
ThisDocument