Behavioral task
behavioral1
Sample
burpsuite_pro_v2023.12.1.2.jar
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
burpsuite_pro_v2023.12.1.2.jar
-
Size
524.0MB
-
MD5
3974f60c0bfe3fcad76fe8329625f32c
-
SHA1
a8114f6cbcf00359c971b664f684ff85d9817d35
-
SHA256
7f83dbd23a2bb81f1bfe60302a570cfd32da1b84f5dfd8cdd01374c26e202779
-
SHA512
2eb885f346841aece568faeede1508ff02db52b0b3212f00dd23dce3ceeef30a2e38b3f4b24e2b9d406952beec9ee4df1102aaefe961c4106ccd2ebfa3ddd101
-
SSDEEP
12582912:bG5DNz5FXu3jivHCBlUwNYsJzxr0+ra2BlFVfXqc9ljAr:C5DNttEFiwqsJW+m2Blvic9RAr
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
burpsuite_pro_v2023.12.1.2.jar.jar