Behavioral task
behavioral1
Sample
dbede9f24e81b21932188644309a223b903aa0aad35a0ddc157046660df3a20a.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dbede9f24e81b21932188644309a223b903aa0aad35a0ddc157046660df3a20a.xls
Resource
win10v2004-20220812-en
General
-
Target
dbede9f24e81b21932188644309a223b903aa0aad35a0ddc157046660df3a20a
-
Size
3.4MB
-
MD5
1f7c036c6472a3bbbe07bf0b997b7e38
-
SHA1
12bb59160e6aef8d1ed9018f2ce209059b24b802
-
SHA256
dbede9f24e81b21932188644309a223b903aa0aad35a0ddc157046660df3a20a
-
SHA512
d65fc22aab7b15c99952078577f2d78aa785611b774fb9c149edc21538e6c48f77758de484fd8fc79a59c7701056a952a13871dfa12705bcaca7a8ef2d628d1a
-
SSDEEP
49152:2b2T/650o+7YoE/vAtrgHQtNGQ5Bdulbav8arH8rKBx5Va69lSR2i8Cx:2bR5F/Y1PG2dulbaUarcrKls69kR2i
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
dbede9f24e81b21932188644309a223b903aa0aad35a0ddc157046660df3a20a.xls windows office2003