Behavioral task
behavioral1
Sample
0b40f68217e04082693050bbabf3883860786ca0cfadedec86bc38c185c67018.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b40f68217e04082693050bbabf3883860786ca0cfadedec86bc38c185c67018.xls
Resource
win10v2004-20240226-en
General
-
Target
0b40f68217e04082693050bbabf3883860786ca0cfadedec86bc38c185c67018.zip
-
Size
125KB
-
MD5
9460340566d446e93dc4a22b7f12bcee
-
SHA1
fb31be14adaeed5d12b62be6f8c6d8c7c36b392d
-
SHA256
2122034ce355d98a352fed18286380c30b9001ba232aa45756709e341a5ef67e
-
SHA512
b31ad87543141871660494f7ac620fcd386e225968a87f3f5fc37d3d97088519431b7244ae250cff1bb4684ef27fd3592bf07ffc9d55342586e34871695ad85b
-
SSDEEP
3072:Pb54nuuR1KQqsjNHnZdguy+601CmwNfq91rpdD10NZ:PVEuuR1eiZbpxTin
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/0b40f68217e04082693050bbabf3883860786ca0cfadedec86bc38c185c67018.xls office_macro_on_action -
resource static1/unpack001/0b40f68217e04082693050bbabf3883860786ca0cfadedec86bc38c185c67018.xls
Files
-
0b40f68217e04082693050bbabf3883860786ca0cfadedec86bc38c185c67018.zip.zip
Password: infected
-
0b40f68217e04082693050bbabf3883860786ca0cfadedec86bc38c185c67018.xls.xls windows office2003
ThisWorkbook
Sheet1
Sheet2