Behavioral task
behavioral1
Sample
0059d183de2a4aff90cf8a6630e821d0f8953f72d01a9a6dec59e990f96d48cd.pps
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0059d183de2a4aff90cf8a6630e821d0f8953f72d01a9a6dec59e990f96d48cd.pps
Resource
win10v2004-20231023-en
General
-
Target
0059d183de2a4aff90cf8a6630e821d0f8953f72d01a9a6dec59e990f96d48cd.ppt
-
Size
308KB
-
MD5
ba9e17e57e32db341315bce00be415f3
-
SHA1
44df66545792ddbf70b4e7c52b3e6968d6df83fb
-
SHA256
0059d183de2a4aff90cf8a6630e821d0f8953f72d01a9a6dec59e990f96d48cd
-
SHA512
d43439ccfb5114d89eea2f6e2b6095f2f2d6b98581b69f2dcee97555ccc16051e63ed67358196236febc20fed892f73783b7e2f6348413543c7694d960bdf3eb
-
SSDEEP
3072:3a+zwdy2VzVJ1XB8yTSrCYlsACKoaW7v9O31+CyhGmXt6xz6i6W6PG:cVJVrwW7v9O31+CyhGmXtuztpv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0059d183de2a4aff90cf8a6630e821d0f8953f72d01a9a6dec59e990f96d48cd.ppt.pps .ppt windows office2003