Behavioral task
behavioral1
Sample
6a820f026479352dafb52273771b4ff814bae4f2ce952deb1bea23d42871517c.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6a820f026479352dafb52273771b4ff814bae4f2ce952deb1bea23d42871517c.xls
Resource
win10v2004-20220901-en
General
-
Target
6a820f026479352dafb52273771b4ff814bae4f2ce952deb1bea23d42871517c
-
Size
69KB
-
MD5
8c01a5489834ad425113016c46295230
-
SHA1
c23ba550381554912b103a489f6acc78a455dc45
-
SHA256
6a820f026479352dafb52273771b4ff814bae4f2ce952deb1bea23d42871517c
-
SHA512
7a3e72c29c1a99c8bdb147d901f6b3610bacfb16fb7bf195f5369786b92bddf31305a83adcb42a578104f9c8139bf1f9489aaaf6557d0feb40028f77c79a8d67
-
SSDEEP
1536:mxcKoSsxz1PDZLDZjlbR868O8KlVH3iTGrBZAPUGvtZkiWnkHLtyeGxcl8/dgquw:mxcKoSsxzNDZLDZjlbR868O8KlVH3iT+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6a820f026479352dafb52273771b4ff814bae4f2ce952deb1bea23d42871517c.xls windows office2003
ЭтаКнига
Лист1
Module3
Module2
Module1