Behavioral task
behavioral1
Sample
161f75cf373cd0d636db8827e5e0de5ff154d36daa5c94350f66980e5dc4e617.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
161f75cf373cd0d636db8827e5e0de5ff154d36daa5c94350f66980e5dc4e617.doc
Resource
win10v2004-20240226-en
General
-
Target
161f75cf373cd0d636db8827e5e0de5ff154d36daa5c94350f66980e5dc4e617
-
Size
136KB
-
MD5
5803e84e10e0a023b279c434c9e69b63
-
SHA1
57b410bd2e20cab43e41ef5e7754ab9ab5c19f11
-
SHA256
161f75cf373cd0d636db8827e5e0de5ff154d36daa5c94350f66980e5dc4e617
-
SHA512
91411a5b9467a7a01d7e0657780008fae2251a37ada62302f1f410f874508544a4a919d86a451cb831444411f00ebaf7ebcef1b5329bfb0d810ec9342fde9e84
-
SSDEEP
3072:y2E4zV+YvwW/Ka8R3zxf5RsZQdRpjVh81eM0FHfXtklHVrr2HYjepdSW4d6Qwlc7:yxqVv24j169LI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
161f75cf373cd0d636db8827e5e0de5ff154d36daa5c94350f66980e5dc4e617.doc windows office2003
ThisDocument
Autoexec
UserForm2