Behavioral task
behavioral1
Sample
SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xls
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsx
-
Size
72KB
-
MD5
12f5e4291444bf00c9eb54d27650aefd
-
SHA1
578cef790638772e3277e711d67dde997e86137e
-
SHA256
28f11f15cf5fcb78d1c8446972055c237a41b56447f353b714bf3278ae6e93ad
-
SHA512
e7072d290947502ac6370c0629d9e288eed502232308d00b986291639fb8da2a1976199d25eefc9de57cc530f45d7ec5406de8464bf631d6efd816ccd6b36776
-
SSDEEP
1536:yk3hOdsylKlgxopeiBNhZFGzE+cL2kdAtPfzlCCqZUh/HsmSLA3FxQ5iTvr:yk3hOdsylKlgxopeiBNhZFGzE+cL2kdC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsx.xls .xlsx windows office2003