Behavioral task
behavioral1
Sample
2b60b1a54367ee5aa25dfcc0c71dc8defb2280abf39a065e32603a445ae575bc.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b60b1a54367ee5aa25dfcc0c71dc8defb2280abf39a065e32603a445ae575bc.doc
Resource
win10v2004-20240226-en
General
-
Target
2b60b1a54367ee5aa25dfcc0c71dc8defb2280abf39a065e32603a445ae575bc
-
Size
1.6MB
-
MD5
5b40e2b7ac4b5161baada09d426b81c4
-
SHA1
b2d11a3c47d8b2df112765cb2c68fe50f754a900
-
SHA256
2b60b1a54367ee5aa25dfcc0c71dc8defb2280abf39a065e32603a445ae575bc
-
SHA512
3f30ff3850a63bef5f25eeb0f5599e6c16fe58b1006926bd881f088123b5721ecdfc3e976814a9740f41fe2dba2999a8f8ce7d776a8875da97e2fd6d00231b8e
-
SSDEEP
24576:rIBxfutWQ+Som8SFQWizEQeX1YlOC8J7CGJfe9FQ7As4TQuGsVLdMb0I9v0T9/:UBNuYIDEEQC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2b60b1a54367ee5aa25dfcc0c71dc8defb2280abf39a065e32603a445ae575bc.doc windows office2003