Behavioral task
behavioral1
Sample
f26f06f51be2934143798b2125ee95ab443529db153d945bd21067db61ef2f8b.unknown
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f26f06f51be2934143798b2125ee95ab443529db153d945bd21067db61ef2f8b.unknown
Resource
win10v2004-20240508-en
General
-
Target
f26f06f51be2934143798b2125ee95ab443529db153d945bd21067db61ef2f8b.unknown
-
Size
259KB
-
MD5
5330d51b00bb98eb91cba1858cdc20c7
-
SHA1
3fa1df52d5da765b47700a6e913ed8c0ef19588c
-
SHA256
f26f06f51be2934143798b2125ee95ab443529db153d945bd21067db61ef2f8b
-
SHA512
d4bb3ed5ebc356e7d9722e8a4478c5809abce69c809060d4e99882922679a33157115f12e484a3ab1b46ed55a3900f813c593f947e545a8d083d2b1b166070ec
-
SSDEEP
1536:0KmRXMXBth38LkLZz8i67MV7VijGN9IKAwUFYhMwUFYcUjPaS9VKH:0K0KZ3Nh0ANdAwUFIMwUF5SPaS9VK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f26f06f51be2934143798b2125ee95ab443529db153d945bd21067db61ef2f8b.unknown.unknown .doc windows office2003