Behavioral task
behavioral1
Sample
4b98a41ade038d2de7260460082104be025d565712f5daafdc621f6707c8c452.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b98a41ade038d2de7260460082104be025d565712f5daafdc621f6707c8c452.xls
Resource
win10v2004-20240226-en
Errors
General
-
Target
4b98a41ade038d2de7260460082104be025d565712f5daafdc621f6707c8c452
-
Size
298KB
-
MD5
f035a3e3f9bb5b8d828904688f0dda8c
-
SHA1
68d361a84300e926193afabb54d3e5b067d4002e
-
SHA256
4b98a41ade038d2de7260460082104be025d565712f5daafdc621f6707c8c452
-
SHA512
7f553c6b8b1322aa83d5df67a9f513b6e7b95b95523f47e048548d5af7b82cada213a68234373ef3a04b15d8a9f980f60fd911fc4f12350c1ad055f9031a892f
-
SSDEEP
6144:r9muNB4BeCJDumHlldnXI3rMHM8L6qWaBxOXn7fL1:rQu2JAmHlld4os8LtWsO37fL1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4b98a41ade038d2de7260460082104be025d565712f5daafdc621f6707c8c452.xls windows office2003