Behavioral task
behavioral1
Sample
3b020707cb4f76660025d28626246271ea799dc9a556e0aa73e405821f23723f.unknown
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b020707cb4f76660025d28626246271ea799dc9a556e0aa73e405821f23723f.unknown
Resource
win10v2004-20240802-en
General
-
Target
853ee203a2ca3444202fc85512617c37.bin
-
Size
9KB
-
MD5
f4d6eb59e44db62faf395076ed10e6fb
-
SHA1
90126c015cddfd503bf6eeb5ac6d46695fd01753
-
SHA256
ead6f8c4cf530b2543721fb86c75e15779526d2355a65dd3a3507a69079216f2
-
SHA512
91ff0119afb44e3d056191244cf1de5f4739f7a57d90a9de712513b9f51308370a1431589cc3ee601b2eed924e655f22fc23f6f35ca81de33b5e259ec89334ab
-
SSDEEP
192:aeMJjiPgBH6lwL7yKytOh5nDbO/b4608OlSzVv9talisG:+GoFVL7yKdh5Z6olSzVltakZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/3b020707cb4f76660025d28626246271ea799dc9a556e0aa73e405821f23723f.unknown office_macro_on_action
Files
-
853ee203a2ca3444202fc85512617c37.bin.zip
Password: infected
-
3b020707cb4f76660025d28626246271ea799dc9a556e0aa73e405821f23723f.unknown.unknown .doc windows office2003