Behavioral task
behavioral1
Sample
ff16379942009ca55ea97839603eec4cca10d8d38157c2bf1a79523027b9401d.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ff16379942009ca55ea97839603eec4cca10d8d38157c2bf1a79523027b9401d.doc
Resource
win10v2004-20240508-en
General
-
Target
ff16379942009ca55ea97839603eec4cca10d8d38157c2bf1a79523027b9401d
-
Size
59KB
-
MD5
e504031a9362b1ad8448948d447bf70e
-
SHA1
943d423ecbd06d2b4dcc67e5c1ab50738b73db91
-
SHA256
ff16379942009ca55ea97839603eec4cca10d8d38157c2bf1a79523027b9401d
-
SHA512
87321e0f6f0590318cafe4b960f8f46188022d4a924018ff8370acd0aa6d1d1944703fc707337ab61126b3a756b4a09a1ba288b82f73747188caf717c91f2f79
-
SSDEEP
384:5ePiSsqdg1vA9vwbt/eJFeeeJ0h1Zaez8t8wxlH/ZFefp/5+GPc+3QTh+kpA0jM5:A5+1o9I41Qt8wxlH/ZFeBRTPDOG8E
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ff16379942009ca55ea97839603eec4cca10d8d38157c2bf1a79523027b9401d.doc windows office2003