Behavioral task
behavioral1
Sample
9482d236ababc87e2e06e4af7ee8989d3846ff8f641ecf077d565b15f760b5df.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9482d236ababc87e2e06e4af7ee8989d3846ff8f641ecf077d565b15f760b5df.doc
Resource
win10v2004-20240226-en
General
-
Target
9482d236ababc87e2e06e4af7ee8989d3846ff8f641ecf077d565b15f760b5df
-
Size
3.6MB
-
MD5
1d1308eca6862c7df70df4f3da01a083
-
SHA1
93bc13fc87c5dc2c8ccabe825b3b9360330b5b64
-
SHA256
9482d236ababc87e2e06e4af7ee8989d3846ff8f641ecf077d565b15f760b5df
-
SHA512
643e2989393c04693a3e21ad86aba0dcd113a4682f54aa090612098ab8f134edacf958454f392eae63f3bdc412b7ef12b4d9b5f59cdf6df4f91192b374b65458
-
SSDEEP
49152:RLPRTNSFLSdowlV3ZMxJtlp7hzmM42YppwdkOXjm2F5:sgLlVYQMnH5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9482d236ababc87e2e06e4af7ee8989d3846ff8f641ecf077d565b15f760b5df.doc windows office2003