Behavioral task
behavioral1
Sample
f835c2479c49b48fa7af9319d01672c4d8cdb71cc008d82a23a7573bd5d124b8.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f835c2479c49b48fa7af9319d01672c4d8cdb71cc008d82a23a7573bd5d124b8.xls
Resource
win10v2004-20230221-en
General
-
Target
03b8ee86e2c20dece50fbe6cceaa383d.bin
-
Size
14KB
-
MD5
c25d956affc8229c52986c753ac293ba
-
SHA1
06014a2e1beadf8a28e4e1f4d3997feb020edd8a
-
SHA256
f1b9dd662cfa09e2eb066218297ec2fa6381d66bc01b2d14e57554df8736e4f7
-
SHA512
854863de35cb7b22235281d8c81daa80bd099c3570561ce971ba5458c6ac5077a60ab54963de2b20a8a511b14a1488d6df77931e997aa206afdc3f6c266c6a63
-
SSDEEP
384:nkeiRHgs7C0flGrNcR/ad6C7gjDPI+Z19F68Eynvxs:nXiRHP7nIKRs6C7gjDh1FVEexs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/f835c2479c49b48fa7af9319d01672c4d8cdb71cc008d82a23a7573bd5d124b8.xls office_macro_on_action
Files
-
03b8ee86e2c20dece50fbe6cceaa383d.bin.zip
Password: infected
-
f835c2479c49b48fa7af9319d01672c4d8cdb71cc008d82a23a7573bd5d124b8.xls.xls windows office2003