Behavioral task
behavioral1
Sample
c618e0f1fa825c50aaca6758b69d0b64743adf6a57982340e4533f31bc158cbe.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c618e0f1fa825c50aaca6758b69d0b64743adf6a57982340e4533f31bc158cbe.doc
Resource
win10v2004-20240508-en
General
-
Target
c618e0f1fa825c50aaca6758b69d0b64743adf6a57982340e4533f31bc158cbe
-
Size
31KB
-
MD5
6eda6ec7f1a1b99d02f41691b8f680a5
-
SHA1
9f3206efe98f38691b27fbcb405c2e75c560347b
-
SHA256
c618e0f1fa825c50aaca6758b69d0b64743adf6a57982340e4533f31bc158cbe
-
SHA512
f411b96386b495e7718dad896868d2213b0e88e8cf67b477da64a6a77decefb6a8fdb9e2ea6354d5affcae0f173442c808a62b3ac11291ed7c2a6316ede9a5ba
-
SSDEEP
192:w6FClLZEvA+6/6rupx+uh9tmOA++CCZ0AYsIPV3PA0jY5OHtZh1ha:wJ8iSupx+YtPsZBYnt/A0jjHtF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c618e0f1fa825c50aaca6758b69d0b64743adf6a57982340e4533f31bc158cbe.doc windows office2003
ThisDocument
NewMacros