Behavioral task
behavioral1
Sample
7a585a723b4883d445d9b712af539cd11ad6d0be4244c04ba672c162b9016ea6.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7a585a723b4883d445d9b712af539cd11ad6d0be4244c04ba672c162b9016ea6.unknown
Resource
win10v2004-20240802-en
General
-
Target
9c721bdc42ca1330fab207085df94ac7.bin
-
Size
9KB
-
MD5
52354043cad340c5ddcbd37b34d48708
-
SHA1
7388630f3bfba6eb3ad35efc2b1d1c8fd0925a16
-
SHA256
0688a3870fa6642253deb99bc32c17322364d24cdcb4f3e794e3e32a59d93ee2
-
SHA512
df8fc641238597da7141024bd27501b5f64c289c281ab1bca7f2dca3ffab5e83a03dad4e81f8e7685aab2f1994948c9b60e1fe1cef94c65e024b581a6279c79a
-
SSDEEP
192:bjQ3LaxZZm/xLjXGxEZKagcYQXjeLA6RzDKxgae+XOQREIXWWiyBh2vJGAEUyLON:nQexqtWEzYQXjeLlDBsjXrZhYWNQJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/7a585a723b4883d445d9b712af539cd11ad6d0be4244c04ba672c162b9016ea6.unknown office_macro_on_action
Files
-
9c721bdc42ca1330fab207085df94ac7.bin.zip
Password: infected
-
7a585a723b4883d445d9b712af539cd11ad6d0be4244c04ba672c162b9016ea6.unknown.unknown .doc windows office2003