Behavioral task
behavioral1
Sample
3ea8860de83f1fa91105200c4e04e64ddac3ab9ffaa48a6c641c0b51121f3f69.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ea8860de83f1fa91105200c4e04e64ddac3ab9ffaa48a6c641c0b51121f3f69.unknown
Resource
win10v2004-20240802-en
General
-
Target
5397797af731d9b8ae090d270930ecb5.bin
-
Size
9KB
-
MD5
130f22fdf25df2a97442b3711d66e340
-
SHA1
4e179dced074fd5eb37c05215fb2ff4101bb8f28
-
SHA256
b28bcaea6c4546b684cc2526e46b3937a3f56b3b0b4f18ac24410f6271c90fa8
-
SHA512
d49ef0248c4f55ffd06d5941c6a5c92e11c57dc46f4e4311bbfc69637e7b2aeb4e450c375e41affcae9ecffc1b83b2da30f10a32a1b1884bce49dc44f58cf5e5
-
SSDEEP
192:+X212SqrKz7sDDcR2HOKimgHhFcGcOErxvaZmW5P5mwCqCloAov9zJEiUG4SJ07Y:uVFKz7sDnRshF7cnvlW5hmNqeoVzJaGj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/3ea8860de83f1fa91105200c4e04e64ddac3ab9ffaa48a6c641c0b51121f3f69.unknown office_macro_on_action
Files
-
5397797af731d9b8ae090d270930ecb5.bin.zip
Password: infected
-
3ea8860de83f1fa91105200c4e04e64ddac3ab9ffaa48a6c641c0b51121f3f69.unknown.unknown .doc windows office2003