Behavioral task
behavioral1
Sample
87cbeb85180789ed1c8c07b586682dec838df37387bf21d1abf2808d948053aa.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
87cbeb85180789ed1c8c07b586682dec838df37387bf21d1abf2808d948053aa.xls
Resource
win10v2004-20220812-en
General
-
Target
87cbeb85180789ed1c8c07b586682dec838df37387bf21d1abf2808d948053aa
-
Size
2.8MB
-
MD5
4b8db37aa2729c9af2aec615265efa69
-
SHA1
5611b178ac601101cc48143c1f3b46b6ea98a6e3
-
SHA256
87cbeb85180789ed1c8c07b586682dec838df37387bf21d1abf2808d948053aa
-
SHA512
f5cf75b348abafeda67206c36a3c521501a501fd74d9627def4514d43774dd63684c533587512e3312764bef48f3d1bb2e32d5693cd8798d3c6d1c5aa4de1d60
-
SSDEEP
24576:ykA1tzdOQpk/4QAxGN0vAGquAGjWwErz56F+D0WeKmj6BYofk+Qznwd5NA/+nTlk:y1ddIgV8N0YGquikFtKmj6Rfk7/yx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
87cbeb85180789ed1c8c07b586682dec838df37387bf21d1abf2808d948053aa.xls windows office2003