Behavioral task
behavioral1
Sample
APT28DropperExcelDoc.xls
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
APT28DropperExcelDoc.xls
-
Size
1.1MB
-
MD5
5debb3535cba6615526c64e44d0f5e2b
-
SHA1
abaa744d9504c7f23a237f8220ac6a441016d518
-
SHA256
5bac7a020f173d6c35f73d76cd3745a36564dbb3dd32f2d5fc5021c353e76a54
-
SHA512
4435f4deebc2f03c3a5659d1a870699d22fdb52525829373cf3bc0592db04da967e14f1e3f001b1cc0b974f8bddb96887480bcb7f14f3172caba1382866676c0
-
SSDEEP
12288:/bkdb1vJu/xtIIcnIE9A3HfOoV+4qF2KhaLZA6H/EHagqNC9:TkdbVJupvSmHfOoaF2KhaLZTx89
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
APT28DropperExcelDoc.xls.xls windows office2003
ThisWorkbook
Hoja1
LinesOfBusiness