Behavioral task
behavioral1
Sample
99b7bac477eb032a24e893d9c9ef0794de0f9f482cf5ec727403a3cccffcaf6c.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
99b7bac477eb032a24e893d9c9ef0794de0f9f482cf5ec727403a3cccffcaf6c.xls
Resource
win10v2004-20220812-en
General
-
Target
8002026137.zip
-
Size
81KB
-
MD5
1c2d53de323a3e9d120b7927739c9318
-
SHA1
a1434fa618c03b879fed8765170a901a3a2c64d1
-
SHA256
5c1d207ef80499f5a4a331eb42df99d0b11b4805d6ed692c180f8b24e17779a0
-
SHA512
41df95bfb002d9cfcd5bba51769b43c8d56412db440e121715bf5dd081d05fadd1b32245ac34089326dce1115ba521fd5227e31443ee6e36da4b92b6fb0ab31a
-
SSDEEP
1536:vOlVpFRh2Wl8/jNJvPk62vmqkMKGYK6qYQHkU2sHRzK94XCKV5s+PuKLO9v6:vOlnFRh2V73vPkmqSGvREC0jKVfPuKSE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/99b7bac477eb032a24e893d9c9ef0794de0f9f482cf5ec727403a3cccffcaf6c office_macro_on_action
Files
-
8002026137.zip.zip
Password: infected
-
99b7bac477eb032a24e893d9c9ef0794de0f9f482cf5ec727403a3cccffcaf6c.xls .js windows office2003