Behavioral task
behavioral1
Sample
2d72ba337bbdf59fe27a876eebd09279ccd05ccebbc02c34ddfdea4c3e5ee092.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d72ba337bbdf59fe27a876eebd09279ccd05ccebbc02c34ddfdea4c3e5ee092.doc
Resource
win10v2004-20240802-en
General
-
Target
2d72ba337bbdf59fe27a876eebd09279ccd05ccebbc02c34ddfdea4c3e5ee092
-
Size
510KB
-
MD5
8eeb619df5eac403d0b818bd60d61397
-
SHA1
cdf03ed2ad66a2e122af18dc888578ca8a53c416
-
SHA256
2d72ba337bbdf59fe27a876eebd09279ccd05ccebbc02c34ddfdea4c3e5ee092
-
SHA512
0f54396115423bbd67c21c02c3b8857a528927dac00d5d4ad2f07a425fb56c7be7a166c46fa524c8daae72f2936f305b15004a030ff00bd0bb0048fb463d10e6
-
SSDEEP
6144:xj3ySmUUKWr+Va+dukLYFz2yqVT6tgJJB1RTe6HVebVAG+kH69Jwvh+9Ulbf:JUKWr+VEUYFz2hd6gLBYiKb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2d72ba337bbdf59fe27a876eebd09279ccd05ccebbc02c34ddfdea4c3e5ee092.doc windows office2003
ThisDocument
bxhrnxwnq
mpzlpnbfp
rhcjyvkfx
xwvncsiza
zoccioikb