Behavioral task
behavioral1
Sample
cbdc93de4eded4d2df825a30f0e255136c3564738e3298f367a4557b5b360eba.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cbdc93de4eded4d2df825a30f0e255136c3564738e3298f367a4557b5b360eba.xls
Resource
win10v2004-20220812-en
General
-
Target
cbdc93de4eded4d2df825a30f0e255136c3564738e3298f367a4557b5b360eba
-
Size
86KB
-
MD5
0eed6374118743dcaf207df327d5fa07
-
SHA1
63cee28b2ae4aa1d204223764ca7d6bbf6ac16cb
-
SHA256
cbdc93de4eded4d2df825a30f0e255136c3564738e3298f367a4557b5b360eba
-
SHA512
b12ba5ddefeb4aacdb4c66c0c9f7e71172a46f0784fdc3373bc50380e7ed5b057c6e9efb791c6fffa6e04d4328020fe739ea6c0828af88980cd4dd2b6e279636
-
SSDEEP
768:D+LbGG7xzpIn44B0jhJbk6OFG2EOREVNkWudde9OLt5TbpTuh75Dm:UpIn44BmkdFGbOREVDSe9Gtxpy1Dm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
cbdc93de4eded4d2df825a30f0e255136c3564738e3298f367a4557b5b360eba.xls windows office2003
ЭтаКнига
Лист1
Лист2
Лист3