Behavioral task
behavioral1
Sample
a05b592a02bd2246e2aeab68cd823919b4d5fd025b9aaa1db8bac65118023d3b.msi
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
a05b592a02bd2246e2aeab68cd823919b4d5fd025b9aaa1db8bac65118023d3b.msi
Resource
win10v2004-20231023-en
General
-
Target
a05b592a02bd2246e2aeab68cd823919b4d5fd025b9aaa1db8bac65118023d3b.msi.zip
-
Size
5.8MB
-
MD5
d6c69c60bfb08f46322c15769ec5c7cc
-
SHA1
3aa6302f86cc4e70d5853985db1e7ff3b2bbd5c8
-
SHA256
ff54f25a89599a37045147870f89bfb953eee7dcbbcac0b0567d39ed57221fc8
-
SHA512
f604577470e2185a4f3edca5dd4bcd2a565cde933796ee49f987d528b55857c39c3b13002e897ed9b7da7e56ff596cde9b9d8e19f92c421c45155fffd4efaed1
-
SSDEEP
98304:5/+ZO6HTILYWkOwsfXhIsbip/cC3rwSh+Mx4rbJbFSZCQnWV3S2jAVildTtMnex3:UZO6z3WkOw1kC3rk0EbJbFSZmV3S2SOX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/a05b592a02bd2246e2aeab68cd823919b4d5fd025b9aaa1db8bac65118023d3b.msi office_macro_on_action
Files
-
a05b592a02bd2246e2aeab68cd823919b4d5fd025b9aaa1db8bac65118023d3b.msi.zip.zip
Password: infected
-
a05b592a02bd2246e2aeab68cd823919b4d5fd025b9aaa1db8bac65118023d3b.msi.msi