Behavioral task
behavioral1
Sample
28277387d28ebdd9b1b85a29ec419e26cf6dfa4a8bef71dd55212125b51746fa.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28277387d28ebdd9b1b85a29ec419e26cf6dfa4a8bef71dd55212125b51746fa.doc
Resource
win10v2004-20240226-en
General
-
Target
28277387d28ebdd9b1b85a29ec419e26cf6dfa4a8bef71dd55212125b51746fa
-
Size
1.2MB
-
MD5
a94926449c8ab75ccd0666cfead8833f
-
SHA1
dff840760e139f4852f51da4318061bad268a314
-
SHA256
28277387d28ebdd9b1b85a29ec419e26cf6dfa4a8bef71dd55212125b51746fa
-
SHA512
73f8b81c7fc6503cdffc1b3830322f519021f7866a0f84e7bf299bc24387bc7d30eaa1ff7e2e3f6151a1d817d94f159c004ba752ca153f217965d4c664f56f31
-
SSDEEP
24576:yXcd/IwnZGoY7wQ1jTXZ/Yvx+77DNzUjOwcHVif+kZDJG910L9dPwspmY7B9ifNG:yXcWwnZGoYP5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
28277387d28ebdd9b1b85a29ec419e26cf6dfa4a8bef71dd55212125b51746fa.doc windows office2003