Behavioral task
behavioral1
Sample
495a10969c3bc71a4e3b205fe324897b7c5d916ade9dc4e7df57571623bf60f8.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
495a10969c3bc71a4e3b205fe324897b7c5d916ade9dc4e7df57571623bf60f8.xls
Resource
win10v2004-20240221-en
General
-
Target
495a10969c3bc71a4e3b205fe324897b7c5d916ade9dc4e7df57571623bf60f8.xls
-
Size
312KB
-
MD5
65262492956bf596bb9c4631bbd58ea0
-
SHA1
958cb99b5a7c89a2ba69196d7fd93484ca50f78f
-
SHA256
495a10969c3bc71a4e3b205fe324897b7c5d916ade9dc4e7df57571623bf60f8
-
SHA512
6979611b445c31a72bbbbb0d711034ae01bb3f0b83cc1df87ad672d7ed8c7898dcf37406744c07e4a4e6e7fc18bd94ab947badf1cad65be36860ef9f092d76e4
-
SSDEEP
6144:cKv/cnonxEtjPOtioVjDGUU1qfDlavx+WYIxCR1HWURpGf7uOw3CLkf70yQx67:5/xGCP3CLkfAA7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
495a10969c3bc71a4e3b205fe324897b7c5d916ade9dc4e7df57571623bf60f8.xls.xls windows office2003