Behavioral task
behavioral1
Sample
80d112f44bbdccc6d7a4501e6f502e84a2a90fcfbe500a9c0eed2570c927c6a6.bin.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80d112f44bbdccc6d7a4501e6f502e84a2a90fcfbe500a9c0eed2570c927c6a6.bin.xls
Resource
win10v2004-20240508-en
General
-
Target
80d112f44bbdccc6d7a4501e6f502e84a2a90fcfbe500a9c0eed2570c927c6a6.bin.sample
-
Size
1.9MB
-
MD5
74ee1023bb6fc9402c4c788996af031d
-
SHA1
8e052e1dd1c3c37a614cdffc804f221ed8dc4b45
-
SHA256
80d112f44bbdccc6d7a4501e6f502e84a2a90fcfbe500a9c0eed2570c927c6a6
-
SHA512
b0e35438793d903488dfb9b5a40f615966c20b2e5f5c93a8487b38bed790b4a065304c7b552b338aafeedea97b5c81d08166997f4cdd33008e9ad5d0aff107ad
-
SSDEEP
24576:iVd/QDRUNF+a2lWJ2dNWJ8cPLU1rGcnBD0mUAauSzttvDOP8RZfSp+Y+8TXi:iVJQDRsFJ2li2XWp4dBnPPaum5O4rP8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
80d112f44bbdccc6d7a4501e6f502e84a2a90fcfbe500a9c0eed2570c927c6a6.bin.sample.xls windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3