Behavioral task
behavioral1
Sample
386ed7ba502e7bf0e60c546476c1c762cbc951eb2a2ba1f5b505be08d60310ef.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
386ed7ba502e7bf0e60c546476c1c762cbc951eb2a2ba1f5b505be08d60310ef.xls
Resource
win10v2004-20240226-en
General
-
Target
386ed7ba502e7bf0e60c546476c1c762cbc951eb2a2ba1f5b505be08d60310ef
-
Size
401KB
-
MD5
02ba9703d1f250b411ea4c868d17fd2e
-
SHA1
27d7eab43b66abd73cdc8da304dbb2daa9842df0
-
SHA256
386ed7ba502e7bf0e60c546476c1c762cbc951eb2a2ba1f5b505be08d60310ef
-
SHA512
c2803749c6dd777f02312ee635c12930082343eab4153c3691cf8bcfe8ec0925d134e094bffee2ceb918a58d59176f07b43fb7b0ba8573325a63eefca487f24c
-
SSDEEP
6144:QxEtjPOtioVjDGUU1qfDlavx+W2QnADP:e
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
386ed7ba502e7bf0e60c546476c1c762cbc951eb2a2ba1f5b505be08d60310ef.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
Module1
userForm