Behavioral task
behavioral1
Sample
b2fe1046682524eceb6eab4f99dcdd652d6777300eb3d2c161fc082df3c52d1f.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2fe1046682524eceb6eab4f99dcdd652d6777300eb3d2c161fc082df3c52d1f.xls
Resource
win10v2004-20220812-en
General
-
Target
b2fe1046682524eceb6eab4f99dcdd652d6777300eb3d2c161fc082df3c52d1f
-
Size
47KB
-
MD5
af897e492a6d2b636dd51217efc3464e
-
SHA1
cbe495b937bfaaba9b11f57ec9112b18c04a6b2d
-
SHA256
b2fe1046682524eceb6eab4f99dcdd652d6777300eb3d2c161fc082df3c52d1f
-
SHA512
24ae65719eca653db8bd3bfccddae1f0b51f74fb362f89cde1fb096a72fc1f6118a14fed887602240258d8b11eee6b208c9783ed607c3e8e3edbc2c8aab0ea05
-
SSDEEP
384:6+LbiwXmQ9MTjCpDa4sy6LCfFwlbciAfQMaViUItq7iiWfIA/XC:6+Lbix7/Cla4gLCfWxci5MhUItdrBXC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
b2fe1046682524eceb6eab4f99dcdd652d6777300eb3d2c161fc082df3c52d1f.xls windows office2003
ЭтаКнига
Лист1
Лист2
Лист3