Behavioral task
behavioral1
Sample
c3eb8cf3171aa004ea374db410a810e67b3b1e78382d9090ef9426afde276d0f.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3eb8cf3171aa004ea374db410a810e67b3b1e78382d9090ef9426afde276d0f.doc
Resource
win10v2004-20240226-en
General
-
Target
c3eb8cf3171aa004ea374db410a810e67b3b1e78382d9090ef9426afde276d0f
-
Size
384KB
-
MD5
f48b1d20f24145800b6552fc73dc0728
-
SHA1
4caec6340591771c8080f5e8d8a72723c03655f2
-
SHA256
c3eb8cf3171aa004ea374db410a810e67b3b1e78382d9090ef9426afde276d0f
-
SHA512
7e5e1cc69b85403a313cb5ef6264926017cf26a5f12b15e5cccfb67eb8ab6f162c34aea6bfe02148561eb1e1c37f256192019c7944a19a3d98e3d3733b669be0
-
SSDEEP
6144:qyN4rUtxZbliGJGuDVOdeCGtw2YoO7+KdFktKk3RS1dVU:1N4otx9QuDjCGtw2JO7B3koy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c3eb8cf3171aa004ea374db410a810e67b3b1e78382d9090ef9426afde276d0f.doc windows office2003
ThisDocument