Behavioral task
behavioral1
Sample
20863a736c17aa6ed45fa399a431c6b08aa43525e4614db37b2809e1951fc582.msi
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
20863a736c17aa6ed45fa399a431c6b08aa43525e4614db37b2809e1951fc582.msi
Resource
win10v2004-20231020-en
General
-
Target
20863a736c17aa6ed45fa399a431c6b08aa43525e4614db37b2809e1951fc582.msi.zip
-
Size
5.3MB
-
MD5
a8f6b7f68ca70c5f452b0a7aed430f69
-
SHA1
609041352dbbca2375de0460b61a6a47a0a739a4
-
SHA256
02a974d661cd73e897275f51d5ffcf02b985aae053aff911fc97ff88c6aef012
-
SHA512
7f88acef142bda1f4bd6ed6a87f76cab644c01634515a5a16039242a19bd90ccc8626b6529bac0c1e1fc9eefb4c4b831782c1c2cb407eec6fb4458b4798c483f
-
SSDEEP
98304:I8NVLr3LVQ3UKCjNW0KQ9RfKw331mjsMZFMhmiUX86P4fKLb:nNFr3FY+RxH1UXMhmC6gfOb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/20863a736c17aa6ed45fa399a431c6b08aa43525e4614db37b2809e1951fc582.msi office_macro_on_action
Files
-
20863a736c17aa6ed45fa399a431c6b08aa43525e4614db37b2809e1951fc582.msi.zip.zip
Password: infected
-
20863a736c17aa6ed45fa399a431c6b08aa43525e4614db37b2809e1951fc582.msi.msi