Behavioral task
behavioral1
Sample
88bf18d3d8020b7234b3afdd05223ee1550e97ae910e691e5b0ef61f9b9b8b22.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88bf18d3d8020b7234b3afdd05223ee1550e97ae910e691e5b0ef61f9b9b8b22.doc
Resource
win10v2004-20240226-en
General
-
Target
88bf18d3d8020b7234b3afdd05223ee1550e97ae910e691e5b0ef61f9b9b8b22
-
Size
1.2MB
-
MD5
86daecb75e44e53d52bc8fea96494b84
-
SHA1
b63a810c6087b1412521fd7febd0b6ade85c95d9
-
SHA256
88bf18d3d8020b7234b3afdd05223ee1550e97ae910e691e5b0ef61f9b9b8b22
-
SHA512
c1f65e92cb3037e0ee06ee247e7494d88b90a27905deac698977ed01c1f695369f7107e1d80fdd1bf40770eae7ebae2873b9b503291695ce2f0affb3581ad396
-
SSDEEP
24576:6pqxPXQhSWXCoFV/EoJ6g+vRqxh/Y7onveSgeKOPYwJgZSlYxwWqzznf7H1kDtte:mqxXRKC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
88bf18d3d8020b7234b3afdd05223ee1550e97ae910e691e5b0ef61f9b9b8b22.doc windows office2003