Behavioral task
behavioral1
Sample
1587e721e2afa098b4094cbe4d7d981ac5f6efb43222bb92fd1bb9e5def96b66
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1587e721e2afa098b4094cbe4d7d981ac5f6efb43222bb92fd1bb9e5def96b66
Resource
win10v2004-20230703-en
General
-
Target
1587e721e2afa098b4094cbe4d7d981ac5f6efb43222bb92fd1bb9e5def96b66
-
Size
560KB
-
MD5
34017c859bf64d724602d62fd77aabc2
-
SHA1
02d995a28204ded843a1f8e00680787f48f76be1
-
SHA256
1587e721e2afa098b4094cbe4d7d981ac5f6efb43222bb92fd1bb9e5def96b66
-
SHA512
1f03491c9db4c31871edf1770db7c51afe5e8fec7f51e5687fe79ff6dfcf424382385a3f09988cb2a261838a7e3d9d28a22521840469eb755b38335aa1e8cc95
-
SSDEEP
6144:j4pKpXF2EMWjcKeUmq0RbXioBD16gFbqW:hpXF2EMWjc7Umxv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1587e721e2afa098b4094cbe4d7d981ac5f6efb43222bb92fd1bb9e5def96b66