Behavioral task
behavioral1
Sample
a38da055da1923a42f8b9373f5db01271c9630b6e3c9da6a31a2048feed04a62.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a38da055da1923a42f8b9373f5db01271c9630b6e3c9da6a31a2048feed04a62.xls
Resource
win10v2004-20220812-en
General
-
Target
a38da055da1923a42f8b9373f5db01271c9630b6e3c9da6a31a2048feed04a62
-
Size
51KB
-
MD5
9886f800de683233752a7e8f811b8283
-
SHA1
004b318fee12f00016764aceecc4ec587eb7884c
-
SHA256
a38da055da1923a42f8b9373f5db01271c9630b6e3c9da6a31a2048feed04a62
-
SHA512
4bf923b892a96773922dbcfc75ff40654e7fa456c35b97cd9592d4fb6cb0aecef9228338d810de8c2dd246f31318c4f96b990022bcf1b0555a2b44fd409c7040
-
SSDEEP
768:FvT2j2d7x3M3HShg7Aama4AdbkTyTPLs8NhdrZThX0rD5JGvhJkO4q2w/kS4MZ:k2ncaAZkWTPLXNhdrZThX0rD5+h9sO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a38da055da1923a42f8b9373f5db01271c9630b6e3c9da6a31a2048feed04a62.xls windows office2003