Behavioral task
behavioral1
Sample
AMLRPT_1178414221.xls
Resource
win7-20231201-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
AMLRPT_1178414221.xls
Resource
win10v2004-20231201-en
0 signatures
150 seconds
General
-
Target
2fa758e896007268bd157764ca9254e4
-
Size
122KB
-
MD5
2fa758e896007268bd157764ca9254e4
-
SHA1
e219f70ff85f7454179a9b5bc7008071e62962e1
-
SHA256
52ac2f322866cffff57be6723cf9237ccbdecbaf7aec7b12e6ad0b0db63ab099
-
SHA512
57c70a8325568e51ce888572bf454a8848bd520a7f753d2c9fc94411c6bcdcf1bd6d809b5d08e601cd2762b8723c519733de662aafa21723dd36271d4483c963
-
SSDEEP
3072:iDcfC2Ox79g1OFsvEq/tDqX32udu0ogMJKHloRs+Lu0Mt:nwi1MME4lA32udu0og/F+lujt
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/AMLRPT_1178414221.xls office_macro_on_action
Files
-
2fa758e896007268bd157764ca9254e4.eml
-
=?UTF-8?B?QU1MUlBUXzExNzg0MTQyMjEuemlw?=.zip
-
AMLRPT_1178414221.xls.xls windows office2003
-
email-html-1.txt