Behavioral task
behavioral1
Sample
fa406c532ea3d7cae05411df0ed5a541630a07f26a247a22d907f424397c72ce.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fa406c532ea3d7cae05411df0ed5a541630a07f26a247a22d907f424397c72ce.doc
Resource
win10v2004-20230915-en
General
-
Target
fa406c532ea3d7cae05411df0ed5a541630a07f26a247a22d907f424397c72ce
-
Size
624KB
-
MD5
8f68008574017fc55bd04f35f967085a
-
SHA1
4f91ae3a87f494fd173fd60f7036a6da8ae730af
-
SHA256
fa406c532ea3d7cae05411df0ed5a541630a07f26a247a22d907f424397c72ce
-
SHA512
47efab047f5515f5ce79cae7a12397ac4b16aad359c9887664acec89630f291198e91c9221b1c5c6bd17f82e53be31bbdfe1c9614c504ff65de202cb568c6fff
-
SSDEEP
12288:mqTujoLzWbo+oop/rEHZ7uTHTnB3ef6jcFPFS3G3779r+lPt4UGh9Ii14VSBAwY:mqT8oOboZYnBBG3H9r+lV419IbVSBAw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fa406c532ea3d7cae05411df0ed5a541630a07f26a247a22d907f424397c72ce.doc windows office2003