Behavioral task
behavioral1
Sample
outflank.doc
Resource
win11-20241007-en
4 signatures
900 seconds
General
-
Target
outflank.doc
-
Size
31KB
-
MD5
6fbadff0dfea598344dfd745651519a5
-
SHA1
2876693e03de35a36122f54721245f3a1ec89904
-
SHA256
1d978375afa9fca1578a179478e5d0527e36bf8f9318d7cdc161f7b25c55c8df
-
SHA512
f9db25da78ab1d6e6e3eda01e4dfc101c52ed41e8c0cde5592ee5b25d3b430b8846ec46f153d57f88c0e457ea216ff58578d69303e705ffa330e724484df9abd
-
SSDEEP
192:1wlLZEvAzi6/6rnsqpZtgmavAcEdRwYswXGrSWh8dA0jC7ccLOtYqzfp0Aa:GFiiSsqdg1vA9L150SWmdA0jocftYA
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
outflank.doc.doc windows office2003
ThisDocument
NewMacros