Behavioral task
behavioral1
Sample
6f79cdfba31b1927fbba05ea5ad812d50129db027cc0c44a95133b4515add2cf.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6f79cdfba31b1927fbba05ea5ad812d50129db027cc0c44a95133b4515add2cf.xls
Resource
win10v2004-20220812-en
General
-
Target
6f79cdfba31b1927fbba05ea5ad812d50129db027cc0c44a95133b4515add2cf
-
Size
4.1MB
-
MD5
b5e032e31f5a0abe0e9df8b8c6456a17
-
SHA1
b351bd9c19115a163c9ef843c48060add9b33eae
-
SHA256
6f79cdfba31b1927fbba05ea5ad812d50129db027cc0c44a95133b4515add2cf
-
SHA512
305b776836a98d61745b911829df72640044723c1e31bada8c1dc8fdc570f21e4cbd90218752f699a44e088d8ebadf6c25060eaba44ea2849d16fff180335b1a
-
SSDEEP
98304:bL3bk+hvn6+85rclAiIEKGcC0gcUz9Pz/g:bL3bPRnl6rcfIEKDf+7I
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6f79cdfba31b1927fbba05ea5ad812d50129db027cc0c44a95133b4515add2cf.xls windows office2003