Behavioral task
behavioral1
Sample
4a483c58721f8b31db84afdfd5500cd9.vbs
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a483c58721f8b31db84afdfd5500cd9.vbs
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
4a483c58721f8b31db84afdfd5500cd9
-
Size
55KB
-
MD5
4a483c58721f8b31db84afdfd5500cd9
-
SHA1
a8764a922b513a638be08a2ffde6ad0ba51c2a47
-
SHA256
38bb62299f99c0f77fafa07587607aaea875072c0eba8b8f67aa9908dc0e8db6
-
SHA512
e807b15a96ec8b51dc382f2c4a9b39cb9ded333174fab8cd27d04359c557535ddbdcb0d7e079bfdebf9e84611086816845677efa399fb74032ce814315592595
-
SSDEEP
384:BDT4trGxqnMK1xrSkF8HGEZqt4LbiSZfI/PKR6ih3mbFQ9oitnLmLeqcxty+4TxD:BP4trGxqnMKsLAPoebFQRecvyRBl
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4a483c58721f8b31db84afdfd5500cd9.doc .vbs windows office2003 polyglot