Behavioral task
behavioral1
Sample
a30a1f14d474fb50ebb766e755a55904703acd2138c0e26546f99a7d774978d2.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a30a1f14d474fb50ebb766e755a55904703acd2138c0e26546f99a7d774978d2.doc
Resource
win10v2004-20240226-en
General
-
Target
a30a1f14d474fb50ebb766e755a55904703acd2138c0e26546f99a7d774978d2
-
Size
1.8MB
-
MD5
e51bc3839bc93d89ff90c76f4fd772b2
-
SHA1
e103a90288dfd2a69e230789fa95a2791fbbba7f
-
SHA256
a30a1f14d474fb50ebb766e755a55904703acd2138c0e26546f99a7d774978d2
-
SHA512
217bc7cdf08fb85f20287631d2eba88a064fcc073cdf9af181ce998337b619c5246501bca15d50ec3a02c5ec7e1571b4e92985cb4753eb28c7f65a2f40674153
-
SSDEEP
12288:XvzAd6DAGwzLrWsWf1V4nMZMtPQmWGG4T1vp3qqUXAlfC7YGk+tBUaHU:UZO3V4nMZMtyZqUXAJCXptBUaHU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a30a1f14d474fb50ebb766e755a55904703acd2138c0e26546f99a7d774978d2.doc windows office2003