Behavioral task
behavioral1
Sample
4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c.xls
Resource
win10v2004-20240226-en
General
-
Target
4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c
-
Size
249KB
-
MD5
6cef87a6ffb254bfeb61372d24e1970a
-
SHA1
e21d95b648944ad2287c6bc01fcc12b05530e455
-
SHA256
4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c
-
SHA512
a99ca0f86da547d2979bd854b29824da77472b16aa2d2dcbc0e5c3eb4b488ae69f9d3006bc326b52b9145076247b64ba55cacfaaf30e417ea8d4f71447d682aa
-
SSDEEP
6144:8k3hOdsylKlgryzc4bNhZF+E+W2knArYi4uU4pVZ8lx+tSea4awSi:PiLZpVZ8lx+tna4TZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4b2862a1665a62706f88304406b071a5c9a6b3093daadc073e174ac6d493f26c.xls windows office2003