Report - converter.dot

VBA_macro Generic Malware MSOffice File
ScreenShot
Created 2021.10.02 17:05 Machine s1_win7_x6402
Filename converter.dot
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Revis
AI Score Not founds Behavior Score
0.8
ZERO API file : clean
VT API (file)
md5 5f8f3c3d90fc96688c9adaa3f0c96889
sha256 3ec53f950da0655748c85cfc72f5ec8b4ab19937d5ba17eb1b1856c9cb149407
ssdeep 384:3xj8yGcSdW+wRsCBkNcgoCsiKnLGJV2LdqtdKxzHsrKGTdHYBvK1X+4DtrtHxpvf:h1KCBAoCggV2LdMEyGMXhBpHxp3
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates hidden or system file

Rules (3cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure