Behavioral task
behavioral1
Sample
286a5f667b8a71e2effb7ce0d6e0a1d21dff6b0b80fb5267f96a026e7cdeb9aa.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
286a5f667b8a71e2effb7ce0d6e0a1d21dff6b0b80fb5267f96a026e7cdeb9aa.xls
Resource
win10v2004-20220812-en
General
-
Target
286a5f667b8a71e2effb7ce0d6e0a1d21dff6b0b80fb5267f96a026e7cdeb9aa.xls
-
Size
540KB
-
MD5
b9ca36cb33a09e95f856fe18537597bf
-
SHA1
3cbab65ed26b01ea69eadafee422d7dd87c767fc
-
SHA256
286a5f667b8a71e2effb7ce0d6e0a1d21dff6b0b80fb5267f96a026e7cdeb9aa
-
SHA512
40faac56a69a1c28d7f24a791dd79e88aa605e8eb72b920ac6418acf9e73731e65367437049cab4726ac6c0ac255b63c9b93bf04070c9edea80457916e78c4a7
-
SSDEEP
6144:hoz9CZ4mJWRMT67EI7mrFy+/RwNp9yQU5t0AjwXWC6ZK62UyL+omUzpwCg2xd0A3:/jwXWPJUh+AqMv9DChz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
286a5f667b8a71e2effb7ce0d6e0a1d21dff6b0b80fb5267f96a026e7cdeb9aa.xls.xls windows office2003