Behavioral task
behavioral1
Sample
26ed7e89b3c5058836252e0a8ed9ec6b58f5f82a2e543bc6a97b3fd17ae3e4ec.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
26ed7e89b3c5058836252e0a8ed9ec6b58f5f82a2e543bc6a97b3fd17ae3e4ec.xls
Resource
win10v2004-20240226-en
General
-
Target
26ed7e89b3c5058836252e0a8ed9ec6b58f5f82a2e543bc6a97b3fd17ae3e4ec
-
Size
1.8MB
-
MD5
591c29acd2fe7325ce3180f5ff59409d
-
SHA1
f9637e4f055537687e469e41be4f6e3492a4b18f
-
SHA256
26ed7e89b3c5058836252e0a8ed9ec6b58f5f82a2e543bc6a97b3fd17ae3e4ec
-
SHA512
4f0ee721d51ae69d1247e79f890fd0d54093e8c57d61467789984240f8ad36a8b4ec9027971e84834d8a5d3412519c5f50c5d26b5be8b4cbb46db49510b2b3a6
-
SSDEEP
12288:vVuQ13jWRGxCzWpT14FSRAEAX/vz62uodt2hyViRHvFBAl1yqvbR/CeVB7gyTo:vVn13Tb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
26ed7e89b3c5058836252e0a8ed9ec6b58f5f82a2e543bc6a97b3fd17ae3e4ec.xls windows office2003