Behavioral task
behavioral1
Sample
3d32c08df545c523b58e2564868edbc1bccf889a37221f8085f93ee9d43b5a35.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d32c08df545c523b58e2564868edbc1bccf889a37221f8085f93ee9d43b5a35.xls
Resource
win10v2004-20240426-en
General
-
Target
3d32c08df545c523b58e2564868edbc1bccf889a37221f8085f93ee9d43b5a35
-
Size
39KB
-
MD5
8eb63e8bdcd6824ba946f5a19688d46e
-
SHA1
baafa0ee5b55ada782c2f7c472571003bdb86bc1
-
SHA256
3d32c08df545c523b58e2564868edbc1bccf889a37221f8085f93ee9d43b5a35
-
SHA512
cb94906e3a71c8078d4f7451a2164ab9531db45a88b8f8d2898888fc2769c474c3bb605b7666edc1c84914d83e18f139ded4881b495072dfd1d9707fe4e52846
-
SSDEEP
768:KB8vT2gXcIH1hkWxZKxyZxggmAd+56OZpiD68s3CjqAKllb3zfB5qi4uLP2FqqId:KBOXcIH1bxZKxywgmAd+tZpiD68s3CjI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3d32c08df545c523b58e2564868edbc1bccf889a37221f8085f93ee9d43b5a35.xls windows office2003