Behavioral task
behavioral1
Sample
b76b82266c242b9675b00c2396fe2a3926831495639802863ed858723b19e1b5.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b76b82266c242b9675b00c2396fe2a3926831495639802863ed858723b19e1b5.unknown
Resource
win10v2004-20240802-en
General
-
Target
1730aa534e19fea2f13e5c20e58ef8e9.bin
-
Size
9KB
-
MD5
7b1c483ca92e22ca119448d0e08136a2
-
SHA1
f847bf169b2d6cf0593f062da1f8b3df97de6fbd
-
SHA256
607b5bc8f640866871781235a50875cb7b8fb6307a50550b09a90a13fe73d962
-
SHA512
856d157292602e9ecee952f28f88bb54dc5a051e4ddda59c890647146d3b540b778169d8b29ed2865324af4d624a0e308ef28c5e3bc26c1e47d4183e91b93721
-
SSDEEP
192:fpMTT/P86tegkW8/4/PfxyXYKnrSxvkRIhf2YvU+yeHuGo1tPeqcwVT62:fGLntembnfsHWhb/hyeOGSG8VT62
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/b76b82266c242b9675b00c2396fe2a3926831495639802863ed858723b19e1b5.unknown office_macro_on_action
Files
-
1730aa534e19fea2f13e5c20e58ef8e9.bin.zip
Password: infected
-
b76b82266c242b9675b00c2396fe2a3926831495639802863ed858723b19e1b5.unknown.unknown .doc windows office2003