Behavioral task
behavioral1
Sample
e51de11ea907cd30d3e23b2fba41db97e5b8e6a09fac5598e558169addae508e.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e51de11ea907cd30d3e23b2fba41db97e5b8e6a09fac5598e558169addae508e.xls
Resource
win10v2004-20240426-en
General
-
Target
e51de11ea907cd30d3e23b2fba41db97e5b8e6a09fac5598e558169addae508e
-
Size
172KB
-
MD5
683c756c5d4b84c12071a9848635aa30
-
SHA1
d4fd9fa1abbd12df8ed0951f8135c92f743f4c93
-
SHA256
e51de11ea907cd30d3e23b2fba41db97e5b8e6a09fac5598e558169addae508e
-
SHA512
ba39032e34eca9fc43d7996c6bc764681367634d263e3ef88f3eaa790323cf92b6305a4dc8176cbf0395d94d00fc40ef43dd7c3d8790641d38f3ce9f0e9a7fae
-
SSDEEP
3072:sBVUpjDqF+wRjh4C+7UisD9q4z8kmODkACo0yAZjVurXn4Zbn8AhN6VJR10hI4Ws:kVUpjDqF+wRjh4C+7UisD9q4z8kmODk/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e51de11ea907cd30d3e23b2fba41db97e5b8e6a09fac5598e558169addae508e.xls windows office2003