Behavioral task
behavioral1
Sample
e5754149d25e68a5c7b5c791ebc7ec6be1db5d8e4743b596221a86360254cea5.msi
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
e5754149d25e68a5c7b5c791ebc7ec6be1db5d8e4743b596221a86360254cea5.msi
Resource
win10v2004-20231020-en
General
-
Target
e5754149d25e68a5c7b5c791ebc7ec6be1db5d8e4743b596221a86360254cea5.msi.zip
-
Size
5.7MB
-
MD5
cc0c9f38740ce768055ea4bfe9d6e9e1
-
SHA1
ea262228bc9a1f17cfdcaaafdb2498f3858122ac
-
SHA256
4114faa7dcdb2331827254b442dd90a3cf3f152fcdf9638c5b538e41dcfa6330
-
SHA512
8af6b802b46ea969fd32803d1f61d93bf4ad9c250547cb94aeca225ad1ec40d1379cf99121000e59affedeb18b01ef03c45a7e59cefc1eeb219c6764da8238fd
-
SSDEEP
98304:eKdbBsFj6wma/PibSNHlVfkeG3zOBs8UhC02FeJ6Qq20i1abJBLKb/:eKdGjp7dHlRXGDOBsJC02Fe8Sabb+D
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/e5754149d25e68a5c7b5c791ebc7ec6be1db5d8e4743b596221a86360254cea5.msi office_macro_on_action
Files
-
e5754149d25e68a5c7b5c791ebc7ec6be1db5d8e4743b596221a86360254cea5.msi.zip.zip
Password: infected
-
e5754149d25e68a5c7b5c791ebc7ec6be1db5d8e4743b596221a86360254cea5.msi.msi