Behavioral task
behavioral1
Sample
06a0be8049fa3ce1f49719d76169a6b93806b15a0532891e0db56f66cdb30933.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06a0be8049fa3ce1f49719d76169a6b93806b15a0532891e0db56f66cdb30933.doc
Resource
win10v2004-20240226-en
General
-
Target
06a0be8049fa3ce1f49719d76169a6b93806b15a0532891e0db56f66cdb30933
-
Size
68KB
-
MD5
579f7e61fc81f726146b06866bc02d27
-
SHA1
ae4c64137de2dbc180b91b720aea7e71f7d042f3
-
SHA256
06a0be8049fa3ce1f49719d76169a6b93806b15a0532891e0db56f66cdb30933
-
SHA512
65732c29173fcbf4d5631685059054b6224a00023da070220a8c81f406a5344cf1aebf89967788c12d0b7cb8e65baba4761e6dc6c27b8e0f38dd1608b227e6d0
-
SSDEEP
768:/yoj2+sm6enryvcC5NEjvJuSdnjlLEnV3uGZTyxY9nntkBWvHbQ3Brzp+:/TSQIr5YvgBZqYbkBWvHbQ3B3o
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
06a0be8049fa3ce1f49719d76169a6b93806b15a0532891e0db56f66cdb30933.doc windows office2003