Behavioral task
behavioral1
Sample
9a83a70661dbbafcc863badc3264fe3d397023ae82c0b5257844ef5bd5e9ad0e.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a83a70661dbbafcc863badc3264fe3d397023ae82c0b5257844ef5bd5e9ad0e.xls
Resource
win10v2004-20240226-en
General
-
Target
9a83a70661dbbafcc863badc3264fe3d397023ae82c0b5257844ef5bd5e9ad0e
-
Size
299KB
-
MD5
1942e3fed9e2f4bf5091793bf8ce8ed1
-
SHA1
b503b47ac9bff9e432b89eb06032efb97b1f293d
-
SHA256
9a83a70661dbbafcc863badc3264fe3d397023ae82c0b5257844ef5bd5e9ad0e
-
SHA512
d46c93c5b7c56bae34a748e1a5f21f6d983771173a7715103de267e96bd982df0f683f0d1d1912ddc7107662315f481b9a86e0b444ac15f474816c27f63fb375
-
SSDEEP
3072:NVwARIh0F3Zdk36ERz5QrXvLe82ucxXaJ7COSbb3FQF5NmLjEd9GUoM25oYHzv6Z:NVwA6l5QrLeBF8GUo6WwS+oT4Enn1i
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9a83a70661dbbafcc863badc3264fe3d397023ae82c0b5257844ef5bd5e9ad0e.xls windows office2003