Behavioral task
behavioral1
Sample
8a28afa411d62e91dd4dc56820eee66b6daf4aa4216773d3cb420faffebe3411.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a28afa411d62e91dd4dc56820eee66b6daf4aa4216773d3cb420faffebe3411.doc
Resource
win10v2004-20240802-en
General
-
Target
8a28afa411d62e91dd4dc56820eee66b6daf4aa4216773d3cb420faffebe3411
-
Size
43KB
-
MD5
c03055806fd5c76b5e458d1ea60c5969
-
SHA1
8e2091b75984826d3ec28a1209a5da94553e2acb
-
SHA256
8a28afa411d62e91dd4dc56820eee66b6daf4aa4216773d3cb420faffebe3411
-
SHA512
8b448a500460f81965189e7521cb4d5603d8cbe6f76fceb408e2959940b2251e50d82b117c7045ec497c10fd14a77a0902d343fbe7bfdbbd46755437f30886be
-
SSDEEP
384:mB6I+iSJPw+QD1IdC+PStrnFeFas/gsQdpLd50ja8:mBFJ+kqChFeFas/g77D38
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8a28afa411d62e91dd4dc56820eee66b6daf4aa4216773d3cb420faffebe3411.doc windows office2003
ThisDocument
NewMacros