Behavioral task
behavioral1
Sample
d89f58c58064930a85aa510dcce962261604afe243c9e3be00e16738519ba6d4.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
d89f58c58064930a85aa510dcce962261604afe243c9e3be00e16738519ba6d4.doc
Resource
win10v2004-20240508-en
General
-
Target
d89f58c58064930a85aa510dcce962261604afe243c9e3be00e16738519ba6d4
-
Size
35KB
-
MD5
8c12f1395f37719c3ebbd28a6033cbe1
-
SHA1
18332782830bdc9bc9bb2e83c8e3726349778080
-
SHA256
d89f58c58064930a85aa510dcce962261604afe243c9e3be00e16738519ba6d4
-
SHA512
f51ac807e47cb54b6031565fb67e83a3eae54d0e3fb43213e9444133218efa367395452c45f5aaaadb31a15088293764bda04f400209e8f3cbcf31f817a9d9cc
-
SSDEEP
384:wcRmuiS9bvQfdTJ7zu2tbccrBgeVMXn4hI3D5ty0j59yt5O:NxvQhhSmS4KK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d89f58c58064930a85aa510dcce962261604afe243c9e3be00e16738519ba6d4.doc windows office2003