Behavioral task
behavioral1
Sample
ce51a6578d1d91cb203f9f44d88dfad9e339fad58a67f181466d6af32ab5e5ed.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce51a6578d1d91cb203f9f44d88dfad9e339fad58a67f181466d6af32ab5e5ed.doc
Resource
win10v2004-20240226-en
General
-
Target
ce51a6578d1d91cb203f9f44d88dfad9e339fad58a67f181466d6af32ab5e5ed
-
Size
3.0MB
-
MD5
093716d8207bd431e287ef259fd300f7
-
SHA1
a643a1d0a486855bf99242f6eff2f1a10e9be2e2
-
SHA256
ce51a6578d1d91cb203f9f44d88dfad9e339fad58a67f181466d6af32ab5e5ed
-
SHA512
1669881d2c93d5f4c6c2cec28839e2dc4f5f1e802f747ab98178e3e5a71589bda3cac749a6fcb9003027f6eb41091b0d62c07fae69163469e5a4b2e3cb0a0ff7
-
SSDEEP
24576:mQ/q9S31Uk9JrJ5cLv1u7zfVYchaOZ0kBdeQXSxo9lrJFCUpBKiyTkfngtR0FWs7:dq9S3rrkQPpdjlrJsUHN7/gL0kR0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ce51a6578d1d91cb203f9f44d88dfad9e339fad58a67f181466d6af32ab5e5ed.doc windows office2003