Behavioral task
behavioral1
Sample
81b76a7ac3e9295fd8718055c574edd7f0d3530d08a77c64e0effd0fa416eb6f.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81b76a7ac3e9295fd8718055c574edd7f0d3530d08a77c64e0effd0fa416eb6f.doc
Resource
win10v2004-20240709-en
General
-
Target
81b76a7ac3e9295fd8718055c574edd7f0d3530d08a77c64e0effd0fa416eb6f
-
Size
52KB
-
MD5
dbd9a53f65d30853458578c11619630f
-
SHA1
851af1fe5228b0bee03fce15ce375ac1936d66d3
-
SHA256
81b76a7ac3e9295fd8718055c574edd7f0d3530d08a77c64e0effd0fa416eb6f
-
SHA512
9a29fe075cb289f6b3a041f62baafe31d948faaab80f56b7dfb32e951842261756f4921a125a1344d73586138d430f8ebec34c6fb72a7a476d960e5dbbf4e50c
-
SSDEEP
768:O3yTDUwzDUPEhAgOOpUWJRHlH0vY6XvvCJbSL:SyP3zDDAgOEflUvN3CJ+L
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
81b76a7ac3e9295fd8718055c574edd7f0d3530d08a77c64e0effd0fa416eb6f.doc windows office2003
ThisDocument
NewModule