Behavioral task
behavioral1
Sample
be345834660619db92373d1d00ad025ad0d3891fd33bf49a7cf51d5ca47d5c1a.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
be345834660619db92373d1d00ad025ad0d3891fd33bf49a7cf51d5ca47d5c1a.xls
Resource
win10v2004-20230220-en
General
-
Target
6e33ac6fffeeafffd24664edb2c5762e.bin
-
Size
181KB
-
MD5
0cd10e59be4b39b23f399d6e6f641a2b
-
SHA1
c19497ce63348471234d7d706ca03a85baa862d0
-
SHA256
ac6f6082ec9eee1e9d6373700d4b0abe08e40295800070709c5495536f27a758
-
SHA512
1fc15ea4ceb0ec22a26331002fb1626a64f5695c45893dd843a93c9e16a6d72dab3be54a1e8e8ef2c58fec41a4d33ab1eb6f8f67bb260e6d792c38903e517c2b
-
SSDEEP
3072:l6jYTXFVbhsYDQ2yCYfnyL7GgjcnAEVJj3wuQMi//aiuOn5VXcPtB4440o06zE:KYT1Vbhs4QnnyL6JVxwt/UOn5mHD4iSE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/be345834660619db92373d1d00ad025ad0d3891fd33bf49a7cf51d5ca47d5c1a.xls office_macro_on_action
Files
-
6e33ac6fffeeafffd24664edb2c5762e.bin.zip
Password: infected
-
be345834660619db92373d1d00ad025ad0d3891fd33bf49a7cf51d5ca47d5c1a.xls.xls windows office2003