Behavioral task
behavioral1
Sample
5ee3d0843e73d073d780a21a2401c3da9d42865513068c71353929e291788f88.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ee3d0843e73d073d780a21a2401c3da9d42865513068c71353929e291788f88.unknown
Resource
win10v2004-20240802-en
General
-
Target
a1b8ef7a802648198499a979e01be6b2.bin
-
Size
9KB
-
MD5
b4413137837e5e5e685f585113c666ac
-
SHA1
8fe2aa56e90b9c0326520e79dc28bf264b1be2cc
-
SHA256
cddda5bc3f5adecea6b7012c47ca820cb043409bc359737862c444fd5af93de6
-
SHA512
7ca939e0565ab8ce648b69b994c22a9934d399dacbfcf78f7db4a4c1b6a4f1ca478be439859c440ce872bc72d3b1b81c9c051529aeb125e4d3a9593ee030d64d
-
SSDEEP
192:sknEy8Naw24ColXv0VqVJQkGwgRWHFVky6+TVDa1tSqXqdO9XN8UWykoB:lEk9hivFtGfWl/MTSMqsZCLoB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/5ee3d0843e73d073d780a21a2401c3da9d42865513068c71353929e291788f88.unknown office_macro_on_action
Files
-
a1b8ef7a802648198499a979e01be6b2.bin.zip
Password: infected
-
5ee3d0843e73d073d780a21a2401c3da9d42865513068c71353929e291788f88.unknown.unknown .doc windows office2003