Behavioral task
behavioral1
Sample
8053a526b667400706107f0ae69bfcf933995a6296f434c4f00dfcdaff5a91c9.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8053a526b667400706107f0ae69bfcf933995a6296f434c4f00dfcdaff5a91c9.doc
Resource
win10v2004-20240226-en
General
-
Target
8053a526b667400706107f0ae69bfcf933995a6296f434c4f00dfcdaff5a91c9
-
Size
1.6MB
-
MD5
34635e877de1e82ae17a09d3fd843210
-
SHA1
4138e96a6a58b044b6c6bf13303dfbdfad521c27
-
SHA256
8053a526b667400706107f0ae69bfcf933995a6296f434c4f00dfcdaff5a91c9
-
SHA512
0a2f2f95da1fc386ec85aeaed4042c37cb48883b80b0318bbe188cd859c158454c193f2dde41582edeac5232107b1d84da963b9302c6072d6f4c79d859a4dea3
-
SSDEEP
24576:mIBxfutWQ+S/mciF6W0zEQBN1ECaCn3K1kS28QMdPCiZrMXdJ3idoDdIASXxaV:ZBNuYIooEQ9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8053a526b667400706107f0ae69bfcf933995a6296f434c4f00dfcdaff5a91c9.doc windows office2003