Behavioral task
behavioral1
Sample
4c4c491a0ab7852d03e9dad9b353b558.vbs
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c4c491a0ab7852d03e9dad9b353b558.vbs
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
4c4c491a0ab7852d03e9dad9b353b558
-
Size
52KB
-
MD5
4c4c491a0ab7852d03e9dad9b353b558
-
SHA1
20722b6fd173aab8c1e7d5005e174776b8027e6e
-
SHA256
7ef7984416b52fda0e8cd0c4e41341fedb122a62f46456ee90c7ef71ab41d7a8
-
SHA512
31e998679fcc0eca86a3706da4216c83ccd4b60ac4377d16a6f1cbbebb781dbe50bcb22267f6487058fc96538799502c1377fc718d21e885af298c70dd8c0f58
-
SSDEEP
384:rLnRUSyghAzHrpOdQn60B2SiSZfI/PKRU7/btqduT9D4t+qmwMKtygldFZ9PERnx:rM60LAPoWBq0TEM+y4wRB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4c4c491a0ab7852d03e9dad9b353b558.doc .vbs windows office2003 polyglot