Behavioral task
behavioral1
Sample
2844450571745689090990873e49159f84346357efe7e32e04e18964b22a4439.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2844450571745689090990873e49159f84346357efe7e32e04e18964b22a4439.doc
Resource
win10v2004-20230915-en
General
-
Target
2844450571745689090990873e49159f84346357efe7e32e04e18964b22a4439
-
Size
37KB
-
MD5
0fceb9a979b8384f114d979338f85c3f
-
SHA1
ee03e1e615acdb76100fb2c9634e59de6d85a894
-
SHA256
2844450571745689090990873e49159f84346357efe7e32e04e18964b22a4439
-
SHA512
9885c62819126beb654c85d0a2f3f0baac1c2295ba7ac3b879cade8527eb27e121f2088ec7961c657b684466b6446fe487cbc6521531a360cf0bbe3cc4ec7ff5
-
SSDEEP
384:aznTdkqLX99UrKbn4W4dTVLxb/VGuFQrnBpZHIx+OCroxYStS1SpS6T5oyJxuotp:a3dkE99RrTmLxRC9HIM5rYj9zJkUp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2844450571745689090990873e49159f84346357efe7e32e04e18964b22a4439.doc .vbs windows office2003
ErtWSgdh58ufTgjHd
kdFjdset4stugxdsfghs
GjseGsw346dtUIdf