Behavioral task
behavioral1
Sample
4b437fa2a193c17fc189d8f0b4ebb71fa618b1db9b670b4243a855419e51e547.doc
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
4b437fa2a193c17fc189d8f0b4ebb71fa618b1db9b670b4243a855419e51e547.doc
Resource
win10v2004-20240226-en
General
-
Target
4b437fa2a193c17fc189d8f0b4ebb71fa618b1db9b670b4243a855419e51e547
-
Size
963KB
-
MD5
9a980b17426f3f86ac90c032d8caf258
-
SHA1
42cdd1a93ab2ea454cf7532f80bd68e819a987fa
-
SHA256
4b437fa2a193c17fc189d8f0b4ebb71fa618b1db9b670b4243a855419e51e547
-
SHA512
2add431e85c1a2349368bf48d2b9c5d53ef893b6e4db1f249fe1926d5b54b22e358c9fb8c5cd09572a6af181c41d21ac932b75cc6128a224c5a3cc936102933f
-
SSDEEP
6144:TH8fdhZyzyDGWfpIZf4yEoMDPqrvnxd82xTmIiGjhw9T1ViOuM6tYPiTL:YEzy5GZAyPMjqrn8sTMGjq2M6tYPi
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4b437fa2a193c17fc189d8f0b4ebb71fa618b1db9b670b4243a855419e51e547.doc windows office2003
ThisDocument