Behavioral task
behavioral1
Sample
469d73acaf4739a060dd2984740dbe8088a0175e2b8b181d4fa611468920b60e.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
469d73acaf4739a060dd2984740dbe8088a0175e2b8b181d4fa611468920b60e.xls
Resource
win10v2004-20230915-en
General
-
Target
469d73acaf4739a060dd2984740dbe8088a0175e2b8b181d4fa611468920b60e.zip
-
Size
695KB
-
MD5
366a52723832986674c66071cd9afc38
-
SHA1
3df9506efcb734b72b53531e5eedabb2dbe8b78c
-
SHA256
40f52988184f963f4cb5b99bacb4bca8ecfdfaa16f640761f5d93148cefac448
-
SHA512
753ac1fd840eb50d37fe65ecf64fcc61a54b73e0060cc2592535af4d9662676e3c505e3c74b0524b4f6aea7f19ff68e97bdb339ff8e87e40469e8e2c9b56a7d5
-
SSDEEP
12288:qOrShLGaDi5x07R6G7wWF7X7lBxnyacZAtCfXfLEvT3CmzfEJnMZOSQtXCy4+x0V:BShKaD807RlwWF7X7leacUC/fLEzCesS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/469d73acaf4739a060dd2984740dbe8088a0175e2b8b181d4fa611468920b60e.xls office_macro_on_action -
resource static1/unpack001/469d73acaf4739a060dd2984740dbe8088a0175e2b8b181d4fa611468920b60e.xls
Files
-
469d73acaf4739a060dd2984740dbe8088a0175e2b8b181d4fa611468920b60e.zip.zip
Password: infected
-
469d73acaf4739a060dd2984740dbe8088a0175e2b8b181d4fa611468920b60e.xls.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
Module1