Behavioral task
behavioral1
Sample
281feb19c954dfca0abb5501b2ce99dc30743cbea9999b588ede42e539d4dada.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
281feb19c954dfca0abb5501b2ce99dc30743cbea9999b588ede42e539d4dada.doc
Resource
win10v2004-20240226-en
General
-
Target
281feb19c954dfca0abb5501b2ce99dc30743cbea9999b588ede42e539d4dada
-
Size
58KB
-
MD5
9cb6bfddc1adf015952eaf264d5dd963
-
SHA1
e52cea59499060b8d0e84a7594a687448599f386
-
SHA256
281feb19c954dfca0abb5501b2ce99dc30743cbea9999b588ede42e539d4dada
-
SHA512
0069d10cbb11ee56a9d3850ec48b537a2547b37c7800d9196a496de520b2c4f6c409535e0df1efab6aa3e23151c2fe8f68065ff3e5dd430c1615793f31dd3947
-
SSDEEP
768:M3KqGdmI9iF7gWMsdMVkK1cdqtTQpVDhxz99oinZ:MFGB9iF7gWMsdlK1cdqiLDh3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
281feb19c954dfca0abb5501b2ce99dc30743cbea9999b588ede42e539d4dada.doc windows office2003
ThisDocument