Behavioral task
behavioral1
Sample
e31ccbac8ded85ff60b3f7ea6a728bea8cf5f15c569fb8d3f22b392cc10f26b6.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e31ccbac8ded85ff60b3f7ea6a728bea8cf5f15c569fb8d3f22b392cc10f26b6.doc
Resource
win10v2004-20231215-en
General
-
Target
e31ccbac8ded85ff60b3f7ea6a728bea8cf5f15c569fb8d3f22b392cc10f26b6
-
Size
157KB
-
MD5
047bed7156ad23e12b3509ca1c4907e0
-
SHA1
e958b8c28b77cbf9f9e8bb45bbfe8cebea58c9f2
-
SHA256
e31ccbac8ded85ff60b3f7ea6a728bea8cf5f15c569fb8d3f22b392cc10f26b6
-
SHA512
769696f9ed72d1bf8032574241a5e06e9580a80a3f7ad1c6dac7bb38fb4127357afdc5a8d725bcf476c4e51f6f0313aee7d8f62f628f129e590ffe8e2a99e53b
-
SSDEEP
3072:PJjmIJ17il/zxhvZi75YkukB+hNAPF56MYENFPvS4sYKfGBhwwUJnxzwMHsDpEp2:xlqkB+dxzk5yvsXudsKX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e31ccbac8ded85ff60b3f7ea6a728bea8cf5f15c569fb8d3f22b392cc10f26b6.doc windows office2003