Behavioral task
behavioral1
Sample
6f5481bbe0be5f4a81cc680dc8c48b2c03c2c7d5a6bcd09305ed3d3ca4ebe10e.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6f5481bbe0be5f4a81cc680dc8c48b2c03c2c7d5a6bcd09305ed3d3ca4ebe10e.xls
Resource
win10v2004-20220812-en
General
-
Target
6f5481bbe0be5f4a81cc680dc8c48b2c03c2c7d5a6bcd09305ed3d3ca4ebe10e
-
Size
43KB
-
MD5
96ab6cd2460ff0a0f7ff2ac43b5eeef5
-
SHA1
44b8ea8cdeb380ad2320ed1ac473064c803360d9
-
SHA256
6f5481bbe0be5f4a81cc680dc8c48b2c03c2c7d5a6bcd09305ed3d3ca4ebe10e
-
SHA512
d9055bca6800f2e36da5388174d2e21c6626b66c3e1ac93118b93dd9fe1db5739be0d069f0eeca967ed4f199db0935459c182233e476039f42d613f4a1ebb27b
-
SSDEEP
768:xG3sxER/vep2wFvHGMIB6tZjA5bTzrjW/axfm8G6/Ys0BWuDjrFIcwWMN2066iQh:ksxER/vep2wFvHGMIB6tZjA5bTzrjW/a
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6f5481bbe0be5f4a81cc680dc8c48b2c03c2c7d5a6bcd09305ed3d3ca4ebe10e.xls windows office2003