Behavioral task
behavioral1
Sample
5b41cfe569d7ff502e5eade3a054ea222869ca796ef2abc59c642dfabb1180e5.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b41cfe569d7ff502e5eade3a054ea222869ca796ef2abc59c642dfabb1180e5.doc
Resource
win10v2004-20240226-en
General
-
Target
5b41cfe569d7ff502e5eade3a054ea222869ca796ef2abc59c642dfabb1180e5
-
Size
1.7MB
-
MD5
9d50143836d41726b6564a524453b868
-
SHA1
c622aea6a413be01c4b343bde0195116e606cad8
-
SHA256
5b41cfe569d7ff502e5eade3a054ea222869ca796ef2abc59c642dfabb1180e5
-
SHA512
2c5b986b4774e93155f4e757c1c771c88a4b948d412545ae9de9ad19ca43652a242dacec8f6c7324e7f89be58854a8aacf1871a1f11a49c137efcf49f83d3d0b
-
SSDEEP
12288:OcZSJtDqHu97hYHafKRLxAuP0mtSuMNlnrVrL8t+ctADOMfxdJC0B:pYpqHuRmaKRLxNJuTv8t+cttMpdXB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5b41cfe569d7ff502e5eade3a054ea222869ca796ef2abc59c642dfabb1180e5.doc windows office2003
ThisDocument