Behavioral task
behavioral1
Sample
d381554b6a8c513992a076abf0f32cbeaefd76ce16cf7ce049def48c5eaf9093.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d381554b6a8c513992a076abf0f32cbeaefd76ce16cf7ce049def48c5eaf9093.doc
Resource
win10v2004-20231215-en
General
-
Target
d381554b6a8c513992a076abf0f32cbeaefd76ce16cf7ce049def48c5eaf9093
-
Size
1.2MB
-
MD5
3cd0406df3036817be01ab517cb468f1
-
SHA1
d9aa0a552ae821feb9230e1ba0cb3d5c986f9bb9
-
SHA256
d381554b6a8c513992a076abf0f32cbeaefd76ce16cf7ce049def48c5eaf9093
-
SHA512
7ca0e31b259ae562492735a2ad9af0a2fa6e84fbb48a1fd94acd8842739f40624727ef3a5691b5f59dbc998d209c6191d10336032a25609765f19be6db75f5ff
-
SSDEEP
24576:cqvLVjWtVCc1sAL5QOL3XuSLJQUsL+WoLfJLIOxjxU1g9/g1uuU1A9j5cIfcGU+O:cqlWTCc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d381554b6a8c513992a076abf0f32cbeaefd76ce16cf7ce049def48c5eaf9093.doc windows office2003