Behavioral task
behavioral1
Sample
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown
Resource
win10v2004-20240802-en
General
-
Target
eaf53d2a1a7147825b0bc108d8d5d120.bin
-
Size
9KB
-
MD5
6a1e6bc4704cb673c853da1dba09a39d
-
SHA1
c4e32dde7901f8781f7fcd642332067177d82f6d
-
SHA256
cab0f4fa0d59b71556b38ad5e40f02e6bd58efd605cbd53f35f16341afddcc60
-
SHA512
d4a6e69add3aa8522c812c2d780953580fe8e0a668b13ca66efbaeb94a57d18a0b58f3a3649fb94f09a23b0a56e039ace3d6144da2916b52d4607db6718f9a0c
-
SSDEEP
192:JDNPJI6NW9eXCebKFQ1m95f5vbOZlYtJAG5unh8XWxHxncFLhCNYRK3:5rNW9QCebRo7BvumC+cyEHxnkIAK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown office_macro_on_action
Files
-
eaf53d2a1a7147825b0bc108d8d5d120.bin.zip
Password: infected
-
411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown.unknown .doc windows office2003