Behavioral task
behavioral1
Sample
6b034bf0909f0873c9eeb6282e89544705393427280d51bf600b397d758d09aa.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b034bf0909f0873c9eeb6282e89544705393427280d51bf600b397d758d09aa.xls
Resource
win10v2004-20220901-en
General
-
Target
6b034bf0909f0873c9eeb6282e89544705393427280d51bf600b397d758d09aa
-
Size
3.1MB
-
MD5
751c1607d4ba13692c35e07aca98c290
-
SHA1
897940b581e281060d1c6ec7d60776cfe31e1cc0
-
SHA256
6b034bf0909f0873c9eeb6282e89544705393427280d51bf600b397d758d09aa
-
SHA512
dd1d5e3b8de6863a95197f0035b6d896ad4fce1387c159f44fbe825a955169c9044f9b93a5e17009e472f1303bb165a9bf999a47289247f4e7636e3bb6c98790
-
SSDEEP
49152:5WD+xFd1ETiy4D0/jmrJ/TOMzlXUdBWxoyknR4YmhQZuMTQqGrWq:gD4FYTiyQ0SrJ/KklEdBWxoyknWp/5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6b034bf0909f0873c9eeb6282e89544705393427280d51bf600b397d758d09aa.xls windows office2003