Behavioral task
behavioral1
Sample
bfdc0eb9ecab7c9e1cb4ae9d9075ade53b23b05b0cf2c447bad7d71440e17da9.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfdc0eb9ecab7c9e1cb4ae9d9075ade53b23b05b0cf2c447bad7d71440e17da9.doc
Resource
win10v2004-20240802-en
General
-
Target
bfdc0eb9ecab7c9e1cb4ae9d9075ade53b23b05b0cf2c447bad7d71440e17da9
-
Size
38KB
-
MD5
aa9edda2514562ade6034272809b95e0
-
SHA1
0990bf8c4950ac78c354b605d0bcaeb0c290f30f
-
SHA256
bfdc0eb9ecab7c9e1cb4ae9d9075ade53b23b05b0cf2c447bad7d71440e17da9
-
SHA512
1fd9a7b98662b0b09a80f29e145567ab7c7d0dc5e74354f02d20a7a06cc431b9547a5695f4b694f34908ca9faf8612d60b8c1a74f009063586864d845e483bd3
-
SSDEEP
768:fuqzQlFXMx469V8RlFZVjUSgskHGDYZU:mqzQlex469V8RlFZVjUSgskHGDY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bfdc0eb9ecab7c9e1cb4ae9d9075ade53b23b05b0cf2c447bad7d71440e17da9.doc windows office2003
ThisDocument
NewMacros