Behavioral task
behavioral1
Sample
c8cff0906dadce365dac5d8bf4f54f205b02c00f94290a8905566bcd3a053d50.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8cff0906dadce365dac5d8bf4f54f205b02c00f94290a8905566bcd3a053d50.doc
Resource
win10v2004-20240226-en
General
-
Target
c8cff0906dadce365dac5d8bf4f54f205b02c00f94290a8905566bcd3a053d50
-
Size
5.8MB
-
MD5
53059538a67346b0d180214aa5c7b448
-
SHA1
9bcb81913603d0b9650d248ce6f4589a997bbf00
-
SHA256
c8cff0906dadce365dac5d8bf4f54f205b02c00f94290a8905566bcd3a053d50
-
SHA512
8980d08f25e688869039f8e78c202d0cd34dfd1103849b45662262f8e86c248ceac86d6222b534afbe722ec5aea9e94ef6f92b55010093923bb6522dd851cb69
-
SSDEEP
49152:QfHzAcGgGfBfSW9xkAr9O6H6WaFj0Zm+y2otfru7/vn5ScQASQ/sJCdqYQvW502F:QfTAcA3M9SKjAuugd4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c8cff0906dadce365dac5d8bf4f54f205b02c00f94290a8905566bcd3a053d50.doc windows office2003