Behavioral task
behavioral1
Sample
INMUN EXCEL CBF OF MV EXPRESS ROME.xls
Resource
win7-20220812-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
INMUN EXCEL CBF OF MV EXPRESS ROME.xls
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
INMUN EXCEL CBF OF MV EXPRESS ROME.xls
-
Size
3.5MB
-
MD5
d4b1c80263e0e3f8a76bcbb30db4905e
-
SHA1
753eb38d28dba32a295330555e81314dd5c4499a
-
SHA256
3180280835ace3ab4cd45b0caa088c25982bec3933a1a3ae9fb631cbd801b03e
-
SHA512
98443a18c56feb65ed1b1ae10d7a2d3d2fc918213c795c3f23bebe9e91aaa7ffada999fea3275acf752174d2e69148e26e56fcacb383cf27528ded8b8fab396e
-
SSDEEP
24576:dPJxWLuF1R/21k4yLKNvheHpIzRlwzf7LtWQxb2clSHEtaFlIP92GJ/Wy+H:dPJA0RBuNpeSo2iShIb/Wy+H
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
INMUN EXCEL CBF OF MV EXPRESS ROME.xls.xls windows office2003