Behavioral task
behavioral1
Sample
ef385ed64f795e106d17c0a53dfb398f774a555a9e287714d327bf3987364c1b.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ef385ed64f795e106d17c0a53dfb398f774a555a9e287714d327bf3987364c1b.xls
Resource
win10v2004-20240226-en
General
-
Target
ef385ed64f795e106d17c0a53dfb398f774a555a9e287714d327bf3987364c1b
-
Size
1.5MB
-
MD5
72e371542ad6fda96bb3fc3b1ee68d92
-
SHA1
3f37ca0db6442743e34768e44450752637930523
-
SHA256
ef385ed64f795e106d17c0a53dfb398f774a555a9e287714d327bf3987364c1b
-
SHA512
1e39b831c912f38297c75e30a89583998a4c27ada484bab58c8e91a0248550152ee29f2e79f5f9a8266e0864d17fdc0cfcf6b9cf62787ca3744dc3bd33bb68ec
-
SSDEEP
24576:RLcW759A2A0gNbth/2cFdT7My+fg9V5cT:qWVe2hg9X/7dT7MJ45
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ef385ed64f795e106d17c0a53dfb398f774a555a9e287714d327bf3987364c1b.xls windows office2003
Sheet1
ThisWorkbook
F