Behavioral task
behavioral1
Sample
6f6ab4abd1c7201c2a7465a8d7eadb924ed5d6d62b1874fc3cfccc7c24870b60.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6f6ab4abd1c7201c2a7465a8d7eadb924ed5d6d62b1874fc3cfccc7c24870b60.xls
Resource
win10v2004-20240508-en
General
-
Target
6f6ab4abd1c7201c2a7465a8d7eadb924ed5d6d62b1874fc3cfccc7c24870b60
-
Size
55KB
-
MD5
30f2f6653369f0438d7a732eaca4521e
-
SHA1
96150ca16f4f9886bb3928b1fe29cf766c0cdd19
-
SHA256
6f6ab4abd1c7201c2a7465a8d7eadb924ed5d6d62b1874fc3cfccc7c24870b60
-
SHA512
e01c0e0decb3580b3145003fb687f189c6bc49a18921072dcdb48ae44c02def0646efc9b8655075d1c4de7739b229e2ee2339db4db9d2605ee6a29786bdb88b7
-
SSDEEP
1536:6nk3hbdlylKsgqopeJBWhZFGkE+kD4LxlnymFycHDBo/V7:6nk3hbdlylKsgqopeJBWhZFGkE+kD4LG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6f6ab4abd1c7201c2a7465a8d7eadb924ed5d6d62b1874fc3cfccc7c24870b60.xls windows office2003