Behavioral task
behavioral1
Sample
e90e3104a90a1e407b82eaeb3f5da46bf02732e02d1ff28a3e9f20a4cbeac4fa.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e90e3104a90a1e407b82eaeb3f5da46bf02732e02d1ff28a3e9f20a4cbeac4fa.doc
Resource
win10v2004-20240802-en
General
-
Target
e90e3104a90a1e407b82eaeb3f5da46bf02732e02d1ff28a3e9f20a4cbeac4fa.doc
-
Size
119KB
-
MD5
c39d1bc4872c7be9b48840a30063cec7
-
SHA1
5cd96e547394a1ca60c3940fec9abd5b8023a4c0
-
SHA256
e90e3104a90a1e407b82eaeb3f5da46bf02732e02d1ff28a3e9f20a4cbeac4fa
-
SHA512
6fe4347cfbf20a96265e08a0199fb53cbcd49d6ae51971ae7f95f17866e54e4c65c4ea10a2e94b5edfe3bf9e85ac165c59e4fd189229b1be66109653b2cda9dc
-
SSDEEP
1536:V7LlLq2TvoxHCQQv56sSFXC5uHQA1pzJGrDwQwMF1UV68j0xQ5M:pLzTKiQa2SgPpzErFN1k6hsM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e90e3104a90a1e407b82eaeb3f5da46bf02732e02d1ff28a3e9f20a4cbeac4fa.doc.doc windows office2003
ThisDocument