Behavioral task
behavioral1
Sample
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c.xls
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c.xls
Resource
win10v2004-20220721-en
General
-
Target
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c
-
Size
681KB
-
MD5
97538afcdbded79ba720361d76574cec
-
SHA1
18602da6c649eac84c93706422c0919b8d035820
-
SHA256
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c
-
SHA512
a3634a471078b92eb55564717c7846f8e6d51a4e968865717a785385bfe8513a8fc9cecc517df4b52cc4a6d1d04f2f5972d98c5e86a41a4aba738ecef0104d3d
-
SSDEEP
12288:Me+b6TaG63jLiyAmuTOdqcWY58hqgxOtijX2mL:MeqFH/ACQ5L
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c.xls windows office2003
Sem
Page1
Module1
UserForm1
Module2
Class1
UserForm6
Page11
Module6
Module5
Module4