Behavioral task
behavioral1
Sample
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc
Resource
win10v2004-20231023-en
General
-
Target
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.zip
-
Size
31KB
-
MD5
9d0407db0a2ebba029aaa96055210433
-
SHA1
6d5ded457358334a3f02a0bf664cbf8255026844
-
SHA256
e790d65bd755883c1b6a24379aa350331b134021dda7befa8b95ef777742161e
-
SHA512
77c84a3641084f23367458002dad05414b46998aa2eaf5a550d614fd012c04567daecb3e08015f73f5347501f7193c327539b499b5cf59f1460a2c36c1d2824f
-
SSDEEP
768:3JlY0ONNYYs5TO9BzKDpF15a5PWyIIxRUGdON3:5/ONBshMBs5aRWyRO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc office_macro_on_action
Files
-
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.zip.zip
Password: infected
-
5b81f8f1208d2dfccb4dd6946102b61ad8f220c7b1c0a80f7be3ca23e6e59b3e.doc.doc windows office2003