Behavioral task
behavioral1
Sample
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc
Resource
win10v2004-20231020-en
General
-
Target
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.zip
-
Size
31KB
-
MD5
4d6fecd01a13e0ae3fbe08549c224bbf
-
SHA1
a108be643b43fdcea65e58b57f22c396e1871fd5
-
SHA256
5608d89240da10aa1cd20413fc00584b00c91da96728bffbefd07506f894211c
-
SHA512
0677de3d38b3328af545006d14b2837c169c03156622fe25bc79121b040c7448180e8ff535b60488d37eafa5101335ec39eccdd5c81574276271556d51c2585c
-
SSDEEP
768:WTYh67DPyJNbQzEu2MRDJtUGFEoLD+0XRyuzhjp2XM8:Wsh67DPwkzETMRDJtUG+ei0XRyuz+X/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc office_macro_on_action
Files
-
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.zip.zip
Password: infected
-
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc.doc windows office2003