Behavioral task
behavioral1
Sample
c6b0e871092eead65e37f5adc24c5aaf4450f24c13cf87eab95e142eb0c74257.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c6b0e871092eead65e37f5adc24c5aaf4450f24c13cf87eab95e142eb0c74257.xls
Resource
win10v2004-20240426-en
General
-
Target
c6b0e871092eead65e37f5adc24c5aaf4450f24c13cf87eab95e142eb0c74257
-
Size
134KB
-
MD5
c2409272bd71f3f812a7b5b5fad1fabc
-
SHA1
90188c55bcb293656ddd0445f513a4456e500446
-
SHA256
c6b0e871092eead65e37f5adc24c5aaf4450f24c13cf87eab95e142eb0c74257
-
SHA512
5fbb6a249cdefdb100798555a722b09352431e987dc483563524299177cb26ca9bb2efcc5500f791479be1b0887f59c052e09cdc77b4b2cc553f351f0087c646
-
SSDEEP
3072:k2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmMRfV:k2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3t
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c6b0e871092eead65e37f5adc24c5aaf4450f24c13cf87eab95e142eb0c74257.xls windows office2003
ThisWorkbook
Sheet1
Module1