Behavioral task
behavioral1
Sample
6a90fe773f24d7b944f7c2adb651fa6ba89956ad362571d67a17e0c54dfc499d.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6a90fe773f24d7b944f7c2adb651fa6ba89956ad362571d67a17e0c54dfc499d.doc
Resource
win10v2004-20240508-en
General
-
Target
6a90fe773f24d7b944f7c2adb651fa6ba89956ad362571d67a17e0c54dfc499d
-
Size
35KB
-
MD5
24452bcd3b0021f3a428dc32b62a1b0f
-
SHA1
28cec296fa3a3ba5074cfa070e710efc3ed48473
-
SHA256
6a90fe773f24d7b944f7c2adb651fa6ba89956ad362571d67a17e0c54dfc499d
-
SHA512
a0cfcf79b046377bee8770b83cf2f8264b30bb900a4873e7d9f9c1464cacca3bc9e869ea92da0224ff99a4bf26342559b99fa37b4f60e6e29cbcf92b44deac44
-
SSDEEP
384:qlE8iSwvxjk+t7DRF8Q8IQ7lbEZ0j9Tth6+G6:qlqxw+tD8DIolE8r6+G6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6a90fe773f24d7b944f7c2adb651fa6ba89956ad362571d67a17e0c54dfc499d.doc windows office2003
ThisDocument
NewMacros