Behavioral task
behavioral1
Sample
9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown
Resource
win10v2004-20240802-en
General
-
Target
a96610c81f16c3a0d9aa521b6f0704a1.bin
-
Size
9KB
-
MD5
26382cfcf4ec01c0dfc61fd333b2b922
-
SHA1
744cef862829a89fb245cbf5cfaad01644b6e51f
-
SHA256
103c3abcc8da3547fcfa7c421eba13330df833fce162a9e2cc1abe66fad13042
-
SHA512
b1afbc162a98c83ee88a226c54d72207a111b93c6ede821ece9c8d87ae98f4d73a567103ccb77f36bf7ea59be549b6ce243ed04876442ce4bab9be52568c8e50
-
SSDEEP
192:a+fD9pDFRQO3JzX6CzQw9JUkHvMVq9dBxmkRbB9E5ib:aEhpDX3JzX6CE0ykHvMadl5kib
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown office_macro_on_action
Files
-
a96610c81f16c3a0d9aa521b6f0704a1.bin.zip
Password: infected
-
9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown.unknown .doc windows office2003