Behavioral task
behavioral1
Sample
5010377fe00ccc064ebf43243f828943e6bc4255e150ed61194dc2d9cb8947bf.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5010377fe00ccc064ebf43243f828943e6bc4255e150ed61194dc2d9cb8947bf.doc
Resource
win10v2004-20240709-en
General
-
Target
5010377fe00ccc064ebf43243f828943e6bc4255e150ed61194dc2d9cb8947bf
-
Size
51KB
-
MD5
109b246d139c3e61b5d627062ca7a09c
-
SHA1
2ef30bf44e7f4f14da5b0484696abfac34d4b2b4
-
SHA256
5010377fe00ccc064ebf43243f828943e6bc4255e150ed61194dc2d9cb8947bf
-
SHA512
d9e6bda3648df2f0a79ef8f7417da679dffbe64dcdeddd377e4021734096d1e7b9c7ba9dd64ffb46fd3048a8785d5479d4f4fd14178aff78eb2b2394d856907d
-
SSDEEP
384:CRcJZCAHiSJPw+QD1ckFVBLuqyEglAncD5xz99wt/9FUaQO+9yfHFPUg0jriFC:7v8+kvzqqyE8AncD5xz99rIzP5Mi
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5010377fe00ccc064ebf43243f828943e6bc4255e150ed61194dc2d9cb8947bf.doc windows office2003
ThisDocument