Behavioral task
behavioral1
Sample
94f609ed5d837ce4c8108076653fa155fc0d3e58b981820f03fa3f8fbc17dd6f.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94f609ed5d837ce4c8108076653fa155fc0d3e58b981820f03fa3f8fbc17dd6f.doc
Resource
win10v2004-20241007-en
General
-
Target
94f609ed5d837ce4c8108076653fa155fc0d3e58b981820f03fa3f8fbc17dd6f
-
Size
541KB
-
MD5
b6840d19c43665320d2457b97160029a
-
SHA1
41da81be8116d3619cf50419cb8ef95c17279a28
-
SHA256
94f609ed5d837ce4c8108076653fa155fc0d3e58b981820f03fa3f8fbc17dd6f
-
SHA512
7b4229f4af9c8aa016c5f5d90cd7273706de691c040f8bcf4f6def9fd31a5a8065cbf907b0e5523daa5c328a7b11ab9c5e75f1cfb36a96240d24b3837418bbdf
-
SSDEEP
12288:8eFuMHQqstgiDUhGvvhrfIetbw2+1GM2n94tc:vIDeGvvhrfq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
94f609ed5d837ce4c8108076653fa155fc0d3e58b981820f03fa3f8fbc17dd6f.doc windows office2003
ThisDocument
NewMacros