Behavioral task
behavioral1
Sample
2a905086ac3cd417480ee05327903baa184d4ddcb59a9500cb16c2c7689a1523_JC.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2a905086ac3cd417480ee05327903baa184d4ddcb59a9500cb16c2c7689a1523_JC.xls
Resource
win10v2004-20230915-en
General
-
Target
2a905086ac3cd417480ee05327903baa184d4ddcb59a9500cb16c2c7689a1523_JC.xls
-
Size
66KB
-
MD5
95b510e35c448752b0f5f43c05df37c5
-
SHA1
10fdc2a076545fe9074de044ef0009e96571ea81
-
SHA256
2a905086ac3cd417480ee05327903baa184d4ddcb59a9500cb16c2c7689a1523
-
SHA512
7d86bb046b210752f53dfcbc5f7c4a53e81edbadfc3503dd1536dbc4af17af2700b2b46f04e68b7148cae05c0d98b320e0227668f7ab3c8ca62901adae28575a
-
SSDEEP
1536:3Qk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxoyyBQHuJmJbgv5F/gTAtQa:3Qk3hbdlylKsgqopeJBWhZFGkE+cL2NJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2a905086ac3cd417480ee05327903baa184d4ddcb59a9500cb16c2c7689a1523_JC.xls.xls windows office2003