Behavioral task
behavioral1
Sample
a3c020bf50d39a58f5345b671c43d790cba0e2a3f631c5182437976adf970633.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3c020bf50d39a58f5345b671c43d790cba0e2a3f631c5182437976adf970633.xls
Resource
win10v2004-20231215-en
General
-
Target
a3c020bf50d39a58f5345b671c43d790cba0e2a3f631c5182437976adf970633
-
Size
1.4MB
-
MD5
f23dd9acbf28f324b290b970fbc40b30
-
SHA1
fa2d17a1675ae8ea0c44a8a06376fe0c6267b7a5
-
SHA256
a3c020bf50d39a58f5345b671c43d790cba0e2a3f631c5182437976adf970633
-
SHA512
86cc6aecd2e08ff0daa5ec5ccec60f16e97e97579f089e6aa730c9f9106083754bbc7e41d0ebcec60e2cf609b0ecf8ea118226d3da2f46f01b20cbe8d0c9c37b
-
SSDEEP
6144:Vf1cbwPwse8axEtjPOtioVjDGUU1qfDlavx+W2QnAkSsRa:XccPwsLY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a3c020bf50d39a58f5345b671c43d790cba0e2a3f631c5182437976adf970633.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
UserForm1