Behavioral task
behavioral1
Sample
0f9d723c3023a6af3e5522f63f649c7d6a8cb2727ec092e0b38ee76cd1bbf1c4.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f9d723c3023a6af3e5522f63f649c7d6a8cb2727ec092e0b38ee76cd1bbf1c4.doc
Resource
win10v2004-20231215-en
General
-
Target
0f9d723c3023a6af3e5522f63f649c7d6a8cb2727ec092e0b38ee76cd1bbf1c4
-
Size
161KB
-
MD5
c7810b25c8edd6269c92af482560e600
-
SHA1
a47d04a5d06db333e19fde0d780cd9d12b70dc99
-
SHA256
0f9d723c3023a6af3e5522f63f649c7d6a8cb2727ec092e0b38ee76cd1bbf1c4
-
SHA512
a1905e1738e08f92599c33ce14e3aedb2f4b6a3a11c8945f1bcee2a3ef6c62389f36f0f8c1f382d300b1ed81a7c9438fcb3cc486ca312a8eb92a1565c1d989a5
-
SSDEEP
1536:3l/jXBM8Z/JvH4wm+oDkC01YNWSmAEW51MpWZemUE7mGc0pXu474eODdz9jgUGpG:3lry2qezHG/+6w9qiSQLFUda
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0f9d723c3023a6af3e5522f63f649c7d6a8cb2727ec092e0b38ee76cd1bbf1c4.doc windows office2003
ThisDocument