Behavioral task
behavioral1
Sample
a0cf410ae327e0bdbc54bfb33d0a47d89a04e9b9aef6280d3f3014c6c98a96f0.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a0cf410ae327e0bdbc54bfb33d0a47d89a04e9b9aef6280d3f3014c6c98a96f0.xls
Resource
win10v2004-20230703-en
General
-
Target
a0cf410ae327e0bdbc54bfb33d0a47d89a04e9b9aef6280d3f3014c6c98a96f0
-
Size
1.2MB
-
MD5
6be3d380aad18b3ca135d386ed3e1741
-
SHA1
73caa016e0012cbd0ba36053559d3926fc84640a
-
SHA256
a0cf410ae327e0bdbc54bfb33d0a47d89a04e9b9aef6280d3f3014c6c98a96f0
-
SHA512
904b6ad6c24172cdb769671c2de9c64e4d1f05457ab6e637c55944b8af97e6fec1d08b030b7f41c2af696479c45804a82d7eb225341ea73cec26ffb2b2693567
-
SSDEEP
6144:uwDb0IA3Q/UDizkEJKcYucUkRBRW7xmQsCv3YhGjqD+9rszACs/060ZmjDWxcDn9:oIoD5/ucxc9jsCQRSG9sjhzL6oBD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a0cf410ae327e0bdbc54bfb33d0a47d89a04e9b9aef6280d3f3014c6c98a96f0.xls windows office2003