Behavioral task
behavioral1
Sample
2b9056e50ab3695c670e588121789aa7986176234756e64d6f47f08bd41378e1.doc
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2b9056e50ab3695c670e588121789aa7986176234756e64d6f47f08bd41378e1.doc
Resource
win10v2004-20241007-en
General
-
Target
2b9056e50ab3695c670e588121789aa7986176234756e64d6f47f08bd41378e1
-
Size
51KB
-
MD5
8bf89ad61b49848a71b1151667332ca7
-
SHA1
70dc257c46a612564fbb1019ad6e5b5269be9886
-
SHA256
2b9056e50ab3695c670e588121789aa7986176234756e64d6f47f08bd41378e1
-
SHA512
57f69b7fdfefacee9912c20f0168a5ef320c18d7383637f0c0687bb5c0eede03ff93cd14f308e353159b65e7ccb9914e67b1ff8b0caf7e45632140fb9445be39
-
SSDEEP
384:Zp0xfMJvBv2xv8R89JMjN6m4iKpIEOqY+tKiSsqdg1vA9tzt/Mi+P0jN4pfZt8Fs:ZkUJJU6wVoJ+1o9t1MRi4pQmv+SWw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2b9056e50ab3695c670e588121789aa7986176234756e64d6f47f08bd41378e1.doc windows office2003
ThisDocument