Behavioral task
behavioral1
Sample
58624fd9a56df42e7fa6336ab9dfba5c.xls
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
58624fd9a56df42e7fa6336ab9dfba5c.xls
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
58624fd9a56df42e7fa6336ab9dfba5c
-
Size
24KB
-
MD5
58624fd9a56df42e7fa6336ab9dfba5c
-
SHA1
34ddd8f925f7cbef7ad6ee07f095076a005e4d0f
-
SHA256
1fb7b86cbedadf7295d92e4c7c76bffbc7c9e3d5cf7bc14c3b3073fbe18d5da9
-
SHA512
332a0e6f5c03855eb4c7b0f7925f637e3a8af5f1aaaf91a03c3d3e762745ea2e2269e3dfebc8e818da47bdd2da7cbea068853522c729b802e4650e2cc47fb31e
-
SSDEEP
384:qE5A57+MuhYNqGRqra7/CGEV4Rp32rPSIEb1:qYA582tRq27/C5GL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
58624fd9a56df42e7fa6336ab9dfba5c.xls windows office2003
ThisWorkbook
Лист1