Behavioral task
behavioral1
Sample
defbe804c96d268a5e58177ac0e4c8e7549f4aa7732f227a90778760b35d4281.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
defbe804c96d268a5e58177ac0e4c8e7549f4aa7732f227a90778760b35d4281.doc
Resource
win10v2004-20240508-en
General
-
Target
8a12bab8ba3fde7a94c5abbf2dbff5fc.bin
-
Size
374KB
-
MD5
0d44be013b0d54b7fec6a5fa5e09bc93
-
SHA1
398ede41349b2f7005c3cc981e0c61fd8dbfc609
-
SHA256
af105b3934420117a7574e83d43d4392f73645a83468dd19f49cdc04b13dddc8
-
SHA512
0ebe1d6b6dd92738f4cbebbb24fc36d624c8168e23f9bc2b73bed2dee41ffd047ebc257b9b48c12be6ca0e11d52d0c3a5dbde245c7d85f77bdc39a6c0a4a1058
-
SSDEEP
6144:9hUqUlM4PEPVV7nVZK2Y3HoPd2TvCni4ERFYUGz45UMmu0znSI4ogoan:/nL4wVVTVMN3IPW0i4YF245U9RznS5f
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/defbe804c96d268a5e58177ac0e4c8e7549f4aa7732f227a90778760b35d4281.doc office_macro_on_action -
resource static1/unpack001/defbe804c96d268a5e58177ac0e4c8e7549f4aa7732f227a90778760b35d4281.doc
Files
-
8a12bab8ba3fde7a94c5abbf2dbff5fc.bin.zip
Password: infected
-
defbe804c96d268a5e58177ac0e4c8e7549f4aa7732f227a90778760b35d4281.doc.doc windows office2003
ThisDocument