Behavioral task
behavioral1
Sample
2b831c76a6ef89520f8820d005782842d6c041c8979b1e111b333af0c73da5a7.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2b831c76a6ef89520f8820d005782842d6c041c8979b1e111b333af0c73da5a7.doc
Resource
win10v2004-20240508-en
General
-
Target
2b831c76a6ef89520f8820d005782842d6c041c8979b1e111b333af0c73da5a7
-
Size
63KB
-
MD5
8888a929cf14f77b7257e6541080e1c4
-
SHA1
d5c6012bb9312ff2027ee4aa456e18539e22e9c6
-
SHA256
2b831c76a6ef89520f8820d005782842d6c041c8979b1e111b333af0c73da5a7
-
SHA512
91b3432cbb3185bd32efeea591e2a93bf176f3e23adad570d1abfdd16f893c78017061b2b1aa47241af19de6aeab021a82dc262418d075818cfe3f46bfaa473a
-
SSDEEP
1536:j9AAAAAAJzYYYYYYYYWTyJA9DzXGhEb6Y9:64Eb6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2b831c76a6ef89520f8820d005782842d6c041c8979b1e111b333af0c73da5a7.doc windows office2003