Behavioral task
behavioral1
Sample
02554a4793d8103c2f32d3c2f44b81e9adb7221f95c93e808a76f83d3cbadea5.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02554a4793d8103c2f32d3c2f44b81e9adb7221f95c93e808a76f83d3cbadea5.doc
Resource
win10v2004-20240226-en
General
-
Target
02554a4793d8103c2f32d3c2f44b81e9adb7221f95c93e808a76f83d3cbadea5
-
Size
1.2MB
-
MD5
f04065964e7c5a0d82a6f4d63efa37aa
-
SHA1
45dcdd642b385473388f3f297ededb061885f897
-
SHA256
02554a4793d8103c2f32d3c2f44b81e9adb7221f95c93e808a76f83d3cbadea5
-
SHA512
7a130dc4f3947638b8e3c4064dd59bd369727e24405e2571a87ae4a7649411ffcf968b4fea1ed5de2888c5db009adb2a8eee461a5bb19d317f81af8c165532de
-
SSDEEP
24576:hAQJcgBqeZGoYTHdqzDLCWdL/xqmLjfUcLQ54LHkLO+10RB1h9x31CVU1h98fTws:hhcWqeZGoYLd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
02554a4793d8103c2f32d3c2f44b81e9adb7221f95c93e808a76f83d3cbadea5.doc windows office2003