Behavioral task
behavioral1
Sample
e6b918ffb6539afb1c0f4e01c1ad45d69d2e98c287ca67cda5d8d7d2ba6a2fc6.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e6b918ffb6539afb1c0f4e01c1ad45d69d2e98c287ca67cda5d8d7d2ba6a2fc6.doc
Resource
win10v2004-20240508-en
General
-
Target
e6b918ffb6539afb1c0f4e01c1ad45d69d2e98c287ca67cda5d8d7d2ba6a2fc6
-
Size
148KB
-
MD5
c224578afa645547bd3eeba4a993711d
-
SHA1
26445a7897b22746ede88cbe7bac078c715a2821
-
SHA256
e6b918ffb6539afb1c0f4e01c1ad45d69d2e98c287ca67cda5d8d7d2ba6a2fc6
-
SHA512
1b4e62fa460866865025326fb05d673ec0090af2fa215162673eb65511185df8dd18fd6fd3b983027e6ad04ac0e07066a0908a78438adb3b77efd91fd283a0cf
-
SSDEEP
3072:HkJAzh96Qwn4sGiLcrQEP0KIQLz0AAcjjBXwr32:EJAzatPBcU6vIQLzLAcZX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e6b918ffb6539afb1c0f4e01c1ad45d69d2e98c287ca67cda5d8d7d2ba6a2fc6.doc windows office2003