Behavioral task
behavioral1
Sample
40989af79e1b10cb8d75ad58039325c1b667b53419b448a42cbce4c0297b20e0.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40989af79e1b10cb8d75ad58039325c1b667b53419b448a42cbce4c0297b20e0.xls
Resource
win10v2004-20240412-en
General
-
Target
40989af79e1b10cb8d75ad58039325c1b667b53419b448a42cbce4c0297b20e0
-
Size
54KB
-
MD5
8a90105e405f3573cfebac86f4764a2e
-
SHA1
2a251346f43696a2d15d9782960624e90ed1356a
-
SHA256
40989af79e1b10cb8d75ad58039325c1b667b53419b448a42cbce4c0297b20e0
-
SHA512
d116909c2a2afdce30af9dd2f670dcc29b40f4aa9911e403e1444036f9d80e0bf0b21d1833a493b47a6c3d9fff24a61ee38b4c34b55d7429e7eaf585dc6a7053
-
SSDEEP
1536:11xEtjPOtioVjDGUU1qfDlaGGx+cL2QnU7WqrIaS7B5ktsGMBPG:11xEtjPOtioVjDGUU1qfDlaGGx+cL2Qs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
40989af79e1b10cb8d75ad58039325c1b667b53419b448a42cbce4c0297b20e0.xls windows office2003
Ark1
ThisWorkbook
Modul1