Behavioral task
behavioral1
Sample
4eea6757cb531019402a914ae6fd1a2ce6ecfcd6f37dc6422468d0403c9241e7.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4eea6757cb531019402a914ae6fd1a2ce6ecfcd6f37dc6422468d0403c9241e7.doc
Resource
win10v2004-20231215-en
General
-
Target
4eea6757cb531019402a914ae6fd1a2ce6ecfcd6f37dc6422468d0403c9241e7
-
Size
20KB
-
MD5
173b2d7fb68f0499941ca475b90d7be6
-
SHA1
08efedce154d7f92d45f3513b683d1b579dceff0
-
SHA256
4eea6757cb531019402a914ae6fd1a2ce6ecfcd6f37dc6422468d0403c9241e7
-
SHA512
00152bfdb1f655f4b928b9d276edb1a4fe9591953e48d953dfadd682f9f8a32a379b95b074e9a729fa4b3fb18d2bdb886e3d2529a0f259e6449f3602364d8843
-
SSDEEP
192:albRtbH/EogJlIfIxsPKtFCJEr+1af/wUemTGLOA4d6y0Ag0jqEOaFRf+UY7:Ult7/E/lIAyPpZsQ6AqeAg0jqMRf+U4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4eea6757cb531019402a914ae6fd1a2ce6ecfcd6f37dc6422468d0403c9241e7.doc windows office2003
ThisDocument
Modul1