Behavioral task
behavioral1
Sample
eb56583140848441a045bbbfda89cfe0b251ca78e1205793208d533c67e717c8.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb56583140848441a045bbbfda89cfe0b251ca78e1205793208d533c67e717c8.doc
Resource
win10v2004-20240508-en
General
-
Target
eb56583140848441a045bbbfda89cfe0b251ca78e1205793208d533c67e717c8
-
Size
32KB
-
MD5
28339b89921f268fda506e426ae4204e
-
SHA1
93f07829d30d466ea7bd844028892ac294763d34
-
SHA256
eb56583140848441a045bbbfda89cfe0b251ca78e1205793208d533c67e717c8
-
SHA512
ec9413c92a5bf1f0cd813d48b10f92c8c2755c91f339093d0fd922a2f0ce8f700d4b87c0b373ab127c97b5995c92d78f3311468a2086279685fe14ded879f895
-
SSDEEP
384:5wl8XAiSJPw+QD1IPucv++kCY50jXstOa:6l83+k+rXy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
eb56583140848441a045bbbfda89cfe0b251ca78e1205793208d533c67e717c8.doc windows office2003
ThisDocument
Module1