Behavioral task
behavioral1
Sample
b20c47efdc5e2f2f9840e1faf5a6b0547210b62ccc167502b8d846b1664044e8.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b20c47efdc5e2f2f9840e1faf5a6b0547210b62ccc167502b8d846b1664044e8.doc
Resource
win10v2004-20230915-en
General
-
Target
b20c47efdc5e2f2f9840e1faf5a6b0547210b62ccc167502b8d846b1664044e8
-
Size
12KB
-
MD5
c6e5f046b7e54601b3592617979cc8cf
-
SHA1
9bec87dc54eb8ca65a7880b6d8956bef6f2ebf12
-
SHA256
b20c47efdc5e2f2f9840e1faf5a6b0547210b62ccc167502b8d846b1664044e8
-
SHA512
4f93e7d37490baa0107e87884e7dd93ddf2d35660f6da9606789a0a20a1bd1e8ecbf01563919f5f8f9ab2858abb461b203081703135f4111007ca95d29975717
-
SSDEEP
192:holExeeOETBH+fN30fvglVNEDg16JKQKZ:mllETBefN3YeVNEDg16MV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b20c47efdc5e2f2f9840e1faf5a6b0547210b62ccc167502b8d846b1664044e8.doc windows office2003
ThisDocument