Behavioral task
behavioral1
Sample
07082024_0932_paypal_charges.doc
Resource
win7-20240705-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
07082024_0932_paypal_charges.doc
Resource
win10v2004-20240802-en
9 signatures
150 seconds
General
-
Target
07082024_0932_paypal_charges.doc
-
Size
59KB
-
MD5
8cb23196027d424917bc9cfe67575de2
-
SHA1
3ec7888e17e08f0f4caf3c4e2d024968abd52d07
-
SHA256
69b6bc4db69680118781e7a9f2580738088930fa04884755f23904fa19e638e3
-
SHA512
e821ff35d6740685752ebfde4003190bf4591ebbbf5e52d026af63dc9e85b8a20ec4f43d7b5fce7fabb7742d1a3eb68a83327b553600beb97d0bd9686662299f
-
SSDEEP
768:Do3yA+qaVFGhiegFVsSiF1NUWJRHlHcv/emFHLCCJ:DMyAFh/6sSufl8vGsLCCJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
07082024_0932_paypal_charges.doc.doc windows office2003
ThisDocument
NewModule