Behavioral task
behavioral1
Sample
28612c5563f8c9866ae4748e5bae80b78145c9fd8cd34e0476a72fc5af69dd7c.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28612c5563f8c9866ae4748e5bae80b78145c9fd8cd34e0476a72fc5af69dd7c.doc
Resource
win10v2004-20240226-en
General
-
Target
28612c5563f8c9866ae4748e5bae80b78145c9fd8cd34e0476a72fc5af69dd7c
-
Size
1.2MB
-
MD5
c05465d31ab17b47d10a30eae62b1c2d
-
SHA1
228161c8cfa24842ed7ab0ca0edc19313c381a56
-
SHA256
28612c5563f8c9866ae4748e5bae80b78145c9fd8cd34e0476a72fc5af69dd7c
-
SHA512
2c710d894f3c50bb04bf3320388da1487274a82808fc7c0977c1d515009aa1e26613acb33a3336616a1a767940d344c31aede610b1a5d47408ac7d7276c19212
-
SSDEEP
24576:bAQJcgBqeZGoYTHd6rjL6edLfRKuLTHUELIR4LHML++1U5B1h9RH1yVU1h9cnrwM:bhcWqeZGoYLd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
28612c5563f8c9866ae4748e5bae80b78145c9fd8cd34e0476a72fc5af69dd7c.doc windows office2003