Behavioral task
behavioral1
Sample
31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e.doc
Resource
win10v2004-20240802-en
General
-
Target
31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e
-
Size
1.9MB
-
MD5
1ee73b17111ab0ffb2f62690310f4ada
-
SHA1
3d3e2e367fe9b358bbb91e5cbcbe90250c220648
-
SHA256
31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e
-
SHA512
811ecc63317c2636729026d95489f6f15053c2e52020a2260a7d6896f06aad39135b0194ddfc2bdd526ecb9d497cf3af90ce1c60b28ee4f2d39f2d14f67a4b36
-
SSDEEP
24576:j1NDbbUMbRNjy8lZ2UFRTHD/mrM1e6sBiNhaYQBFq:vDbJbvjynUyCpx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e.doc windows office2003
ThisDocument
UserForm1