Behavioral task
behavioral1
Sample
790c86593d2d86364a1118c304c857824a56f14a9f8661f0a22e86953d1c81f4.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
790c86593d2d86364a1118c304c857824a56f14a9f8661f0a22e86953d1c81f4.doc
Resource
win10v2004-20240426-en
General
-
Target
0817661adc483a2add42cf8a5edd222a.bin
-
Size
59KB
-
MD5
c1e1d6cf9e14b42d2604c3ba55444194
-
SHA1
780fb1f3f8a57ac9505deaf4a56ea3c8de12b081
-
SHA256
f37d1b947445361ad889318d24307e047e88883dda6328ddbd070e932297e830
-
SHA512
b2e08106c7e44aa26e9278e08caf3cd26aa26a8caf12589209bd9f3dfad48fe95255638a10069f4e83f2064ded83c7d274577e4e92fad60106fc3ab3121ed207
-
SSDEEP
1536:2uGmj53juPDwGy7PTZmodiMKnoHWB3Wi6AUj/w:2nmhjynyLTMS3koqX6Acw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/790c86593d2d86364a1118c304c857824a56f14a9f8661f0a22e86953d1c81f4.doc office_macro_on_action -
resource static1/unpack001/790c86593d2d86364a1118c304c857824a56f14a9f8661f0a22e86953d1c81f4.doc
Files
-
0817661adc483a2add42cf8a5edd222a.bin.zip
Password: infected
-
790c86593d2d86364a1118c304c857824a56f14a9f8661f0a22e86953d1c81f4.doc.doc windows office2003
ThisDocument
NewMacros