Behavioral task
behavioral1
Sample
0cbf193495591240ca4ef2331db9444610b9e882bfca91886b4aedee4bdfaa97.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cbf193495591240ca4ef2331db9444610b9e882bfca91886b4aedee4bdfaa97.doc
Resource
win10v2004-20240226-en
General
-
Target
0cbf193495591240ca4ef2331db9444610b9e882bfca91886b4aedee4bdfaa97
-
Size
22KB
-
MD5
156c9364dd37f1803ab4cb17ff6f0d6b
-
SHA1
406361ced539a097acb142d05f741e40852f8a10
-
SHA256
0cbf193495591240ca4ef2331db9444610b9e882bfca91886b4aedee4bdfaa97
-
SHA512
fae0c228153a1c2367726615a1b1abdf386baebe257eca7b3e159b27213dfe1231e93868a7c7a88f14957d1e8d57e0ffa30f891c4b463c679c5f9bddcd4617e0
-
SSDEEP
384:2ptdaEXR/l1SrRWeRtX9zuFFHNjhyVsJ/6F8ya8:kL/lIrRWmX9INRyCya8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0cbf193495591240ca4ef2331db9444610b9e882bfca91886b4aedee4bdfaa97.doc windows office2003
Modul1
DieseArbeitsmappe
Tabelle1