Behavioral task
behavioral1
Sample
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown
Resource
win10v2004-20240802-en
General
-
Target
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown
-
Size
24KB
-
MD5
eaf53d2a1a7147825b0bc108d8d5d120
-
SHA1
a35f816c43593416bad26abe37d96270369f4581
-
SHA256
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f
-
SHA512
887f25c8a393b79720c0a5db144f645dcf5644e79c1ee988bd538b24a42cd1bbe0eebed1003c04b0f29933e0b62372cb5001669beca82aa8401f36db15675d70
-
SSDEEP
192:r8oK3rcd5kM7ffi4UMF1pkOvpF3EiRcx+NSzfxmrmE76tNY2pCumJ0pQrXVjavmh:gGekfnVxVNOmrmEu3YcrmSpC1h
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown.unknown .doc windows office2003