Behavioral task
behavioral1
Sample
dcf3000bdcc1eb1c24fdd8feaf057d9c9b1c4fd9af7887361ea8da91dc475aa9.doc
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dcf3000bdcc1eb1c24fdd8feaf057d9c9b1c4fd9af7887361ea8da91dc475aa9.doc
Resource
win10v2004-20230703-en
General
-
Target
6ef2667c08165b47c54f99d63027a79f.bin
-
Size
517KB
-
MD5
a2866b77bfc90ed0ee6ac6cdf86dcdeb
-
SHA1
b0ce8609f8961a7f5fda360e9179686a00bcbcf2
-
SHA256
f8d26e61a1af16817fdeb1684aec685e193f5be45165c94d9938ab0447f1235a
-
SHA512
7669da75dcdb55b1eb4e05c167b09430681f2f4d4706ac1ff02871cd621a672f71352989c72e56dabd81d5b14264150447080a8fc60c1a7a803cd64c68dbf0f1
-
SSDEEP
12288:8KOK6SE1W23m96xSvjs97GHZAfmLBQN6EDwDTlh/9MZWS+MNw:8K6G23WQ8u++wEwNCZx3O
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/dcf3000bdcc1eb1c24fdd8feaf057d9c9b1c4fd9af7887361ea8da91dc475aa9.doc office_macro_on_action -
resource static1/unpack001/dcf3000bdcc1eb1c24fdd8feaf057d9c9b1c4fd9af7887361ea8da91dc475aa9.doc
Files
-
6ef2667c08165b47c54f99d63027a79f.bin.zip
Password: infected
-
dcf3000bdcc1eb1c24fdd8feaf057d9c9b1c4fd9af7887361ea8da91dc475aa9.doc.doc windows office2003
ThisDocument
NewMacros