Behavioral task
behavioral1
Sample
f506b80e90477b4a92dff08b151f9edf795a0647829cdf92e2680c782da716ba.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f506b80e90477b4a92dff08b151f9edf795a0647829cdf92e2680c782da716ba.doc
Resource
win10v2004-20240802-en
General
-
Target
f506b80e90477b4a92dff08b151f9edf795a0647829cdf92e2680c782da716ba
-
Size
38KB
-
MD5
11e087de003e73d5268b8fb58dcdd591
-
SHA1
6ce4843283e8359a2db9a5442a044667ba74dbc1
-
SHA256
f506b80e90477b4a92dff08b151f9edf795a0647829cdf92e2680c782da716ba
-
SHA512
994f333bb81b2352042ad8b4eeea906fa873de3d402e9e187dbf78958e11eceade8466d7246741759991d8223b0f3a9166406913219e11347df577da1866044a
-
SSDEEP
384:fe+86SiSwvxjk+tzC0OR/egp/SO0CZfosdOKHXyknWzOg0jFBt4/:/Vxw+tKR/DhZfosdN3yknqnA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f506b80e90477b4a92dff08b151f9edf795a0647829cdf92e2680c782da716ba.doc windows office2003
ThisDocument
NewMacros