Behavioral task
behavioral1
Sample
A128F8C49D87022AC9D6323D9F4801A4876C75FC5FECB1C3448DDF62E492B78A.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
A128F8C49D87022AC9D6323D9F4801A4876C75FC5FECB1C3448DDF62E492B78A.xls
Resource
win10v2004-20230220-en
General
-
Target
A128F8C49D87022AC9D6323D9F4801A4876C75FC5FECB1C3448DDF62E492B78A
-
Size
422KB
-
MD5
7f34dd3bd892efe3f1073bcb90cb2c00
-
SHA1
dc3c479d33770a6a0a15767a6dec6cd93e95a32d
-
SHA256
a128f8c49d87022ac9d6323d9f4801a4876c75fc5fecb1c3448ddf62e492b78a
-
SHA512
b567b0c5edc604d2487e669730d6e0dff16cade5045d8e4bf2e5d1f6d49a0c2a626fe0a4fc4e55e5787799977ee9c788432f4a29376ae0ce6ea58226149f44d0
-
SSDEEP
6144:7k3hOdsylKlgryzc4bNhZF+E+W2knAb7tuWCXs4g82s8nT3AnAhS39EV3rA1GRhX:dtuWmH8nxU6yIjTQl/v2b
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
A128F8C49D87022AC9D6323D9F4801A4876C75FC5FECB1C3448DDF62E492B78A.xls windows office2003