Behavioral task
behavioral1
Sample
b894980cf8646ca7c9e1ca281d9251fe5d0589654fd6867653755c44e486083c.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b894980cf8646ca7c9e1ca281d9251fe5d0589654fd6867653755c44e486083c.unknown
Resource
win10v2004-20240802-en
General
-
Target
c87f55966d5c7521f65bab509a3920b4.bin
-
Size
9KB
-
MD5
b8b437eabeb8645b171901bd499f6076
-
SHA1
55a0ad016ddbb11600211af399677970ea481469
-
SHA256
c175609b45528b7366bb8a0fd34fcdfc95d58f17ed71f323f6d93950f7febd13
-
SHA512
d5ca0076cd12b7dd1a22e833442c089eb27b511ccaf5edc4822c389519491e42a6f82c1fdb291b098f0dc5b262ef989664795061921518629ad67bae5662d5ab
-
SSDEEP
192:pykaCWDZS6aNj14OLPKgsPTK7LCZvdi3Txph4tSgMWX/Q+7I1uzeR6W:psCU9S4ODKg06gI3tpKfX/Qvca
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/b894980cf8646ca7c9e1ca281d9251fe5d0589654fd6867653755c44e486083c.unknown office_macro_on_action
Files
-
c87f55966d5c7521f65bab509a3920b4.bin.zip
Password: infected
-
b894980cf8646ca7c9e1ca281d9251fe5d0589654fd6867653755c44e486083c.unknown.unknown .doc windows office2003