Behavioral task
behavioral1
Sample
a485dcf952543920fe35b3608e1157464bbbaf6cfe42b8699779d298b5cdb23d.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a485dcf952543920fe35b3608e1157464bbbaf6cfe42b8699779d298b5cdb23d.xls
Resource
win10v2004-20240226-en
General
-
Target
a485dcf952543920fe35b3608e1157464bbbaf6cfe42b8699779d298b5cdb23d
-
Size
304KB
-
MD5
51d6d0acd76a583d78e8963abb4e084e
-
SHA1
f831126c580442b8de4585efe6c896a3fb943d65
-
SHA256
a485dcf952543920fe35b3608e1157464bbbaf6cfe42b8699779d298b5cdb23d
-
SHA512
7506a25556f6175b79fc1303852c8af93cd5982fc2b07195d209a1880108b6e305794b875f79e71404ead5643fb81ef4331073a38eb2cf9d7a78ba48be1694a1
-
SSDEEP
6144:GVdqHlzKgCVQAPqWQtTKB98molObIUuiooHQ:G/qHlmqWQtTu98dObILiooQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a485dcf952543920fe35b3608e1157464bbbaf6cfe42b8699779d298b5cdb23d.xls windows office2003