Behavioral task
behavioral1
Sample
e218e05c2f70c1dcf0673a31edc260ecda87e18625c3a00791e2c2ce96a09e25.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e218e05c2f70c1dcf0673a31edc260ecda87e18625c3a00791e2c2ce96a09e25.xls
Resource
win10v2004-20240426-en
General
-
Target
e218e05c2f70c1dcf0673a31edc260ecda87e18625c3a00791e2c2ce96a09e25
-
Size
45KB
-
MD5
47c307ae53f63fb2ef143cfcab4f7dda
-
SHA1
59f36fbad9f2285fe8d846452ca0d5b8ecba118a
-
SHA256
e218e05c2f70c1dcf0673a31edc260ecda87e18625c3a00791e2c2ce96a09e25
-
SHA512
240aac1df9418810d73971b30f2842957108c4b18dad63cbea89b47c15eaa957a31e1b5ca3ea8648d05cb453ee84190bfca54b28ac65482551aeefac105bcd23
-
SSDEEP
768:ACEKxEtjPOtioVjZUGGnwfDlaGGx+cLYI7o4Dd8pNA5FL+d/n+mcif:iKxEtjPOtioVjZUGGnwfDlaGGx+cLYIs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e218e05c2f70c1dcf0673a31edc260ecda87e18625c3a00791e2c2ce96a09e25.xls windows office2003