Behavioral task
behavioral1
Sample
f26787cf1a1a81fa38f25c152fe65eed4e70b6c5eedf58305dd03278dd191ca4.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f26787cf1a1a81fa38f25c152fe65eed4e70b6c5eedf58305dd03278dd191ca4.unknown
Resource
win10v2004-20240802-en
General
-
Target
f26787cf1a1a81fa38f25c152fe65eed4e70b6c5eedf58305dd03278dd191ca4.unknown
-
Size
24KB
-
MD5
fc12c6b98aa5a6d911a41cb1a6a7f4b5
-
SHA1
515f293bbd3905fda909ea0db7cb644df2e6644b
-
SHA256
f26787cf1a1a81fa38f25c152fe65eed4e70b6c5eedf58305dd03278dd191ca4
-
SHA512
eb6f7e081c0b49bbdbd61d21a77b814e6aa8dc0bc26938b1510e8d2e6050437a7824750c7339fbe68f6ba485183c5a6605936617f16d4cd10ab99b1af3c7449e
-
SSDEEP
192:r8oK3rcd5kM7ffi4UMF1pkOvpF3EiRcx+NSzfxmrmE76tNY2pCumJ0pQrXVjavmv:gGekfnVxVNOmrmEu3YcrmSpC1v
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f26787cf1a1a81fa38f25c152fe65eed4e70b6c5eedf58305dd03278dd191ca4.unknown.unknown .doc windows office2003