Behavioral task
behavioral1
Sample
EA1E38F0E64061C6B47899741C81E277CBB81B070C30B451A5EBD904158B66FA.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
EA1E38F0E64061C6B47899741C81E277CBB81B070C30B451A5EBD904158B66FA.doc
Resource
win10v2004-20231215-en
General
-
Target
EA1E38F0E64061C6B47899741C81E277CBB81B070C30B451A5EBD904158B66FA
-
Size
273KB
-
MD5
dc748da446ed9b8e519ea1b903e9d1a3
-
SHA1
14c3dd620ff148cf9981883a70e263e0407baa26
-
SHA256
ea1e38f0e64061c6b47899741c81e277cbb81b070c30b451a5ebd904158b66fa
-
SHA512
e595678fdd360b4d0166fe5d260908c8a28ba22b60064d08a8c5143736465e6150605aa2fe3894fc83d495fabae88f24d7ade75298e1edb5f69a894435160ed1
-
SSDEEP
6144:v56KTYymfG/9kr0An7Gd69WFEeRSX0LBHTL:x6KTYyVo1n7GdDC0Ld
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
EA1E38F0E64061C6B47899741C81E277CBB81B070C30B451A5EBD904158B66FA.doc windows office2003
ThisDocument
NewMacros