Behavioral task
behavioral1
Sample
0e5fd63c0e66a9b87a2c50d1f3f1e6720a2b7b08de360035bbc3b92c0145a6a8.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e5fd63c0e66a9b87a2c50d1f3f1e6720a2b7b08de360035bbc3b92c0145a6a8.xls
Resource
win10v2004-20240226-en
General
-
Target
0e5fd63c0e66a9b87a2c50d1f3f1e6720a2b7b08de360035bbc3b92c0145a6a8
-
Size
256KB
-
MD5
8a9e5a6eeadd64a48a59e1d19d224498
-
SHA1
4d6238a6eb6ac428880539dce7b4eee1c79ad127
-
SHA256
0e5fd63c0e66a9b87a2c50d1f3f1e6720a2b7b08de360035bbc3b92c0145a6a8
-
SHA512
dcbaa20bc7152a27d7dd55886b0d4c0b81b493b22854a09b166693fa64a2d706e2161f85a2c111cdc8301f08096718077a9140fc3b267f32a3e0f3e04ecd7bdd
-
SSDEEP
3072:CpJwAUAHxIYTSYQviRReLcQBiPwyN0zNCmfXh4lxeatyyry/NHISglI8lVHm:C0qIYTSYQwAnlHYIZTk+WdNl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0e5fd63c0e66a9b87a2c50d1f3f1e6720a2b7b08de360035bbc3b92c0145a6a8.xls windows office2003