Behavioral task
behavioral1
Sample
a1e2e57fdb1d6a913933178ce3775b6efc3f36ae9d6d9e1f0e50d2832019f39e.unknown
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a1e2e57fdb1d6a913933178ce3775b6efc3f36ae9d6d9e1f0e50d2832019f39e.unknown
Resource
win10v2004-20240508-en
General
-
Target
a1e2e57fdb1d6a913933178ce3775b6efc3f36ae9d6d9e1f0e50d2832019f39e.unknown
-
Size
259KB
-
MD5
8b879b17f5084bf232eeb24dfea1a45b
-
SHA1
b5700a2bb22127151c9ce9dcda1ab0a5f18e29f0
-
SHA256
a1e2e57fdb1d6a913933178ce3775b6efc3f36ae9d6d9e1f0e50d2832019f39e
-
SHA512
9e331600c8f93f12c8ff147a4daa7fb38a360a3e0c64a692c24369471ba5b707379d97b811062756280c29942ec46337b4f73fa2e4fc3b3c93ecdde5b060644c
-
SSDEEP
1536:0KmRXMXBth38LkLZz8i67MV7VijGN9IKAwUFYhMwUFYwUjPaS9VKH:0K0KZ3Nh0ANdAwUFIMwUFVSPaS9VK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a1e2e57fdb1d6a913933178ce3775b6efc3f36ae9d6d9e1f0e50d2832019f39e.unknown.unknown .doc windows office2003