Behavioral task
behavioral1
Sample
a00c0a714cd26da31483159d7f9909174ebca143e87c98201358d40b36b8f51e.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a00c0a714cd26da31483159d7f9909174ebca143e87c98201358d40b36b8f51e.xls
Resource
win10v2004-20231215-en
General
-
Target
a00c0a714cd26da31483159d7f9909174ebca143e87c98201358d40b36b8f51e
-
Size
299KB
-
MD5
2f7b14b469c9dbff1465cc321e2bc6ed
-
SHA1
c7214fa6477065927fb6138a162108d6642c0926
-
SHA256
a00c0a714cd26da31483159d7f9909174ebca143e87c98201358d40b36b8f51e
-
SHA512
bffe096f6b503e512f7c3c3070718c22cd18806279675384e5202b88ed96a8ac4d891c862f70c01f7349cd4c5e9bdc37f2e76a21194a4df767466d34a4fb5007
-
SSDEEP
3072:wVwARIh0F3Zdk36ERz5QrXvLe82ucxXaJ7COSbb3FQF5NmLjEd9GUoM25oYHzv6Z:wVwA6l5QrLeBF8GUo6WwS+oT4Enn1i
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a00c0a714cd26da31483159d7f9909174ebca143e87c98201358d40b36b8f51e.xls windows office2003