Behavioral task
behavioral1
Sample
0de6138c7be3275667ad044043d0a06ad976c716c032c219d8e26c7a89728fc0.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0de6138c7be3275667ad044043d0a06ad976c716c032c219d8e26c7a89728fc0.doc
Resource
win10v2004-20240802-en
General
-
Target
0de6138c7be3275667ad044043d0a06ad976c716c032c219d8e26c7a89728fc0
-
Size
56KB
-
MD5
755636acb7fa134e3af92f3479cb1702
-
SHA1
6f39522ffc9558f284f9d2eba4c5c52c5fbe985c
-
SHA256
0de6138c7be3275667ad044043d0a06ad976c716c032c219d8e26c7a89728fc0
-
SHA512
04ba444e31e5343a223dbac12e54ef6d15e67541bcd8e32a78120d618d1441ac2eafa33d0fb800d727a8555bde17e4eb05e3748d796eb1b75acb06e53692d81b
-
SSDEEP
768:6zzfKTTdJRshHF9bOM/j55SG9RN0CSclTCUmfFnDhPlThHty9:EHDFt5JRKHQTCZ1PlTha
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0de6138c7be3275667ad044043d0a06ad976c716c032c219d8e26c7a89728fc0.doc windows office2003