Behavioral task
behavioral1
Sample
f5d561e80808f32402321ba76cae6b93f8141d152796efacfdae08e94b5b1b11.docx
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f5d561e80808f32402321ba76cae6b93f8141d152796efacfdae08e94b5b1b11.docx
Resource
win10v2004-20231215-en
General
-
Target
f5d561e80808f32402321ba76cae6b93f8141d152796efacfdae08e94b5b1b11.zip
-
Size
190KB
-
MD5
51fcb5ce57b3103e35edf2f62ced8b52
-
SHA1
3347eef005bc3cb969b8b5e5a6c86f7109337c0d
-
SHA256
91ed0f1b12a220d092c3a1210f4cc10722858fb521eb45d8f26f088ffd304b3c
-
SHA512
c190c462cc2dc367c723370b96c29379a7d13f7ac6bd2666a20a742d98ddd9112c42b42579bb4193ccbee74d715209d30e8fa82fab241d0040918f65118e005a
-
SSDEEP
3072:pdH4oGALUY8hq1z4Z2hu8U7BTq+7QzitX1Mi5vo1uLOa9jfaS/xtq2Zry5:pdH4o/ohasAhudPMQ9o12wS/xtq2Zry5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/f5d561e80808f32402321ba76cae6b93f8141d152796efacfdae08e94b5b1b11.docx office_macro_on_action
Files
-
f5d561e80808f32402321ba76cae6b93f8141d152796efacfdae08e94b5b1b11.zip.zip
Password: infected
-
f5d561e80808f32402321ba76cae6b93f8141d152796efacfdae08e94b5b1b11.docx.doc .docx windows office2003