Behavioral task
behavioral1
Sample
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc
Resource
win10v2004-20230915-en
General
-
Target
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.zip
-
Size
31KB
-
MD5
3f431c1c947c81cb407f19aed834ad3e
-
SHA1
bd4e3db19d97d1d03c363d8cc58e2358e73586ce
-
SHA256
c955b4a263a150e87c945fae19e01fe806e6f794a34152256a905d361a3481f9
-
SHA512
ef80c84bef0e96bd84778886f65fd6a78116bbf0aba091c01686fadb6b86b39aab242cc9d025c327359bf6ea533d1646fe81776efad75e1500aa085d6d5b21a2
-
SSDEEP
768:PturD71b0UfPRSf2m09OpYRQe9NoNHv68zOkvDWKAspA:PwtbzHRSY5JINHCKihsK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc office_macro_on_action
Files
-
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.zip.zip
Password: infected
-
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc.doc windows office2003