Behavioral task
behavioral1
Sample
e1130a660b6d67427852778b7f13369f6020d916135863a5d5ce14231dd0683c.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e1130a660b6d67427852778b7f13369f6020d916135863a5d5ce14231dd0683c.xls
Resource
win10v2004-20220901-en
General
-
Target
e1130a660b6d67427852778b7f13369f6020d916135863a5d5ce14231dd0683c
-
Size
99KB
-
MD5
6cf582214187bf41578adb950bdf49b0
-
SHA1
9047fbf071455ceaed4a7d8f3796d2c5a6ac457f
-
SHA256
e1130a660b6d67427852778b7f13369f6020d916135863a5d5ce14231dd0683c
-
SHA512
a0ac5dd864a73e1c3f878d91728de049b34d5ed07a8025490d40150e7d51b28e52a0c6e576b91029977d55d57f017bc3c19c614a27516f917e023b1296fd2d1e
-
SSDEEP
1536:4AAAaaAuLjZdlMsLcA/fuM0FiySJoZQ8f3boGAF1zv9UEnbskbF2Mrbz4jpLtD2/:HoZQnvsK2Mrbz4jpLws+4o09ieF0vxD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource yara_rule sample office_xlm_macros
Files
-
e1130a660b6d67427852778b7f13369f6020d916135863a5d5ce14231dd0683c.xls windows office2003