Behavioral task
behavioral1
Sample
6d97d4045ec1803584e749984fff5cea75fd387454195014f80689abfae5337b.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6d97d4045ec1803584e749984fff5cea75fd387454195014f80689abfae5337b.xls
Resource
win10v2004-20230220-en
General
-
Target
6d97d4045ec1803584e749984fff5cea75fd387454195014f80689abfae5337b
-
Size
458KB
-
MD5
5bc3723f2e5833a60ec6adc7299bbccc
-
SHA1
a4eb08d96f06c714608c9bcd2632cf2a0897c733
-
SHA256
6d97d4045ec1803584e749984fff5cea75fd387454195014f80689abfae5337b
-
SHA512
00b78eece1dcc9a284576e2f79ce51c7479cb3a680512433e775896af06a49e80bcfe22b259125208eec09a1f4482abe583b883b5e51f465ca6bcbf94ed6c580
-
SSDEEP
6144:hScfvomphosnQ51R4h3d5VSoXuZpxzmjfpNJo51nlNqz8VY:hSpMA4H5uSjKHnXqz8VY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6d97d4045ec1803584e749984fff5cea75fd387454195014f80689abfae5337b.xls windows office2003