Behavioral task
behavioral1
Sample
63080fdc778708c82885e351ca364d51e6a961ba526685c0e38f6eeb2e5e43e9.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63080fdc778708c82885e351ca364d51e6a961ba526685c0e38f6eeb2e5e43e9.doc
Resource
win10v2004-20240226-en
General
-
Target
63080fdc778708c82885e351ca364d51e6a961ba526685c0e38f6eeb2e5e43e9
-
Size
1.6MB
-
MD5
f59e69d9848d99089505f2ae5cc171a9
-
SHA1
0b30b7d067e50d1d6c9e2275076f2802c01f9484
-
SHA256
63080fdc778708c82885e351ca364d51e6a961ba526685c0e38f6eeb2e5e43e9
-
SHA512
1f47864f2e6e7b4e7c077cf8fbdaafa8c9c5aa3c43df5adc9735a2ad30b766c49006f3bfa6894ec3c35f72ae00103ffd2b682fcc2d0432900220067cc5700483
-
SSDEEP
24576:V7Irtv919uxpEQLA+S9VNZn3k7LVednLDdoWTLtRVn1DI1Af1An1Fs1gU1RU1hF:VkrF9u/EQLY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
63080fdc778708c82885e351ca364d51e6a961ba526685c0e38f6eeb2e5e43e9.doc windows office2003