Behavioral task
behavioral1
Sample
c6b203f66a77dd285afae967774b0ae6cccbafac1b436b3e977f30b757be3280.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c6b203f66a77dd285afae967774b0ae6cccbafac1b436b3e977f30b757be3280.doc
Resource
win10v2004-20241007-en
General
-
Target
c6b203f66a77dd285afae967774b0ae6cccbafac1b436b3e977f30b757be3280
-
Size
42KB
-
MD5
4cc91b9a5dfe93c3b37af0a5cdbd6b83
-
SHA1
a9efe1ad1127ba50814d6413efeab6770bc22df3
-
SHA256
c6b203f66a77dd285afae967774b0ae6cccbafac1b436b3e977f30b757be3280
-
SHA512
667db0a850bd7a934163babc76ea849de9ea3203f27fc44773184afc1a8590b0b41d707c569c97d700746ddd80febc5feba4a03cb68ee147e096c92319f7c6d2
-
SSDEEP
384:fi8iS8px8SMDfDRCttBXZtFyTz+pek/iuE/H7kyzQ/+DQCgN0jFp/:fq3ySZtFi+pekqRP5W+K6p/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c6b203f66a77dd285afae967774b0ae6cccbafac1b436b3e977f30b757be3280.doc windows office2003
ThisDocument
NewMacros