Behavioral task
behavioral1
Sample
56591fa2bcfe7ff7370a0296cfd6cfdcf07fb374737f72a4f0995ba1a6bfb65c.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
56591fa2bcfe7ff7370a0296cfd6cfdcf07fb374737f72a4f0995ba1a6bfb65c.xls
Resource
win10v2004-20240412-en
General
-
Target
56591fa2bcfe7ff7370a0296cfd6cfdcf07fb374737f72a4f0995ba1a6bfb65c
-
Size
68KB
-
MD5
eeeddee3865a2c4782db1917d3c62cd0
-
SHA1
b2b3a28be33b583e0d3328acd092495cdede0180
-
SHA256
56591fa2bcfe7ff7370a0296cfd6cfdcf07fb374737f72a4f0995ba1a6bfb65c
-
SHA512
1f4c9d403678093d78492345816239586f7aa21727aaa39c82b5ffae97ca95bf6668b5b316b1ca19b36b5e20f9b2f4d5e03a22f6a020401594a6823473a1ce5d
-
SSDEEP
1536:B4Xk3hOdsylKlgxopeiBNhZFGzE+cL/gGAxe5+9+VwR+mci:mXk3hOdsylKlgxopeiBNhZFGzE+cL/g/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
56591fa2bcfe7ff7370a0296cfd6cfdcf07fb374737f72a4f0995ba1a6bfb65c.xls windows office2003