Behavioral task
behavioral1
Sample
42b027c8e126e5671257a706b326f7ee047648b604f3a14be3aa436b8f25c37b.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42b027c8e126e5671257a706b326f7ee047648b604f3a14be3aa436b8f25c37b.doc
Resource
win10v2004-20240802-en
General
-
Target
42b027c8e126e5671257a706b326f7ee047648b604f3a14be3aa436b8f25c37b
-
Size
915KB
-
MD5
90d2eb146cacf5514cbb24ddbd2a23d2
-
SHA1
48edae3b626b0a263c72c728bf3708216442183d
-
SHA256
42b027c8e126e5671257a706b326f7ee047648b604f3a14be3aa436b8f25c37b
-
SHA512
198d957c787f0374863e37723551a89c9711d4db86c89468b190728e546f6c51d4b8b9f35f764500f560752a24e7cf0745bf29015194ce996b5fdca019a01104
-
SSDEEP
24576:W+0n7S8E5z8hiwrXxx+GNz/RCkkOwdBDmNae0BJwn:ZB8E5zpwrXfHYkkzBgae0BJwn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
42b027c8e126e5671257a706b326f7ee047648b604f3a14be3aa436b8f25c37b.doc windows office2003
ThisDocument