Behavioral task
behavioral1
Sample
504498552a4980e27517a482a623f625.vbs
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
504498552a4980e27517a482a623f625.vbs
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
504498552a4980e27517a482a623f625
-
Size
39KB
-
MD5
504498552a4980e27517a482a623f625
-
SHA1
d2e32c3fd5dfe746b3b415ec2d97f4e73ad44a2f
-
SHA256
17f26362b733ce484354193c86785921aa3e71c0dbe8cc09042f8736e679f273
-
SHA512
f298b09eef217103c92cd2baae0a5ffc9b15837baff60f1146afb9e61d415e9af3292b766bdecc763ae95ce3384ac5ab21c592f2e85d3bc3f3dcd35d1fb32ccc
-
SSDEEP
384:SQcDls0c5+iSiUps2NhRcMItP4lF7X0j6Xt2:SQqLRhaptPMbBs
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
504498552a4980e27517a482a623f625.doc .vbs windows office2003 polyglot