Behavioral task
behavioral1
Sample
bbfa082096706f821ab56587319bc6e71cf7018869de8b56a69366cbf4d84501.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbfa082096706f821ab56587319bc6e71cf7018869de8b56a69366cbf4d84501.unknown
Resource
win10v2004-20240802-en
General
-
Target
296e0a008a07e6bfbc2365ccfccae500.bin
-
Size
9KB
-
MD5
1ff7ba57a4fadd52de94ed98c7550ef3
-
SHA1
4b0821a95b34fc9f36c61b5c9205809cbb7ae177
-
SHA256
c4500ebf023f9d840a769e9183e450a6a01d66e93ebf83cbf6efe0f1b158b85c
-
SHA512
d51f827495fcfb7cb4e916574ab5bb2126a1c0d5ad0dbff945e232ea67d3189462bdf41d488c34cdebe98b4e515f8423a14425211ed1352471f3f829bfd3f26f
-
SSDEEP
192:+vjIq2y18oivUpbe7YffpmvN3UefH+W8sDYSKFGhnuNu/Sg5vdhHEMQhla:+81oispbeapmvN3HfH+GDYjghuNuqgxx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/bbfa082096706f821ab56587319bc6e71cf7018869de8b56a69366cbf4d84501.unknown office_macro_on_action
Files
-
296e0a008a07e6bfbc2365ccfccae500.bin.zip
Password: infected
-
bbfa082096706f821ab56587319bc6e71cf7018869de8b56a69366cbf4d84501.unknown.unknown .doc windows office2003