Behavioral task
behavioral1
Sample
8bc720268c9baa975cfaa356315d7919b9a69f2e615722aca3d25430ad86c263.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8bc720268c9baa975cfaa356315d7919b9a69f2e615722aca3d25430ad86c263.xls
Resource
win10v2004-20240426-en
General
-
Target
8bc720268c9baa975cfaa356315d7919b9a69f2e615722aca3d25430ad86c263
-
Size
54KB
-
MD5
7dcda583823f4872edba0805231cf06b
-
SHA1
474140b15af689731711b891444fbd3ede5dbc45
-
SHA256
8bc720268c9baa975cfaa356315d7919b9a69f2e615722aca3d25430ad86c263
-
SHA512
0e6a7d101acf10de26a4a74219eda608d89a1fd9f903bb4d35ad6ebe1dd45a1e50c3f46ba998a6982ee15475e703e797e082b1e31789117696aee93b2ef8160e
-
SSDEEP
1536:skk3hbdlylKsgqopeJBWhZFGkE+kD4Lxln8zV3RO1IUZXnGH27:skk3hbdlylKsgqopeJBWhZFGkE+kD4LN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8bc720268c9baa975cfaa356315d7919b9a69f2e615722aca3d25430ad86c263.xls windows office2003