Behavioral task
behavioral1
Sample
5fdab6397534ded5b4682ae1c53e3bba8a293999ffb7fe71ae39608bda5373af.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5fdab6397534ded5b4682ae1c53e3bba8a293999ffb7fe71ae39608bda5373af.doc
Resource
win10v2004-20240704-en
General
-
Target
5fdab6397534ded5b4682ae1c53e3bba8a293999ffb7fe71ae39608bda5373af
-
Size
71KB
-
MD5
363a07eeff14532992a1dafb8dd4cffb
-
SHA1
4200334294803b2c90c0b336894fac766e835189
-
SHA256
5fdab6397534ded5b4682ae1c53e3bba8a293999ffb7fe71ae39608bda5373af
-
SHA512
dabb80d9791ba1654ca285e84354349b8df3095766161ec97445d4aef9853d0bbd5cb34033a05c5fced319468c80c591ab3471961ded5283d056035410c74736
-
SSDEEP
768:+qMVkX2n8888S38R+H4Wg3K+fKLvJ8U8tzXi2CIwnQP0KkANmHquHkFdUG3wTqCh:+qlmm8R+H4WgiLvJwzANQP0a6fp+hHf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5fdab6397534ded5b4682ae1c53e3bba8a293999ffb7fe71ae39608bda5373af.doc windows office2003
ThisDocument