Behavioral task
behavioral1
Sample
e660fb19e19d060e4021888d7033f17f54f90b339c0ac722ab81708922d7038a.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
e660fb19e19d060e4021888d7033f17f54f90b339c0ac722ab81708922d7038a.xls
Resource
win10v2004-20240508-en
General
-
Target
e660fb19e19d060e4021888d7033f17f54f90b339c0ac722ab81708922d7038a
-
Size
38KB
-
MD5
904e418fed709041844f9503cb22cfa5
-
SHA1
c8f57b3d3ffeea6220930eb12df522b92ace3ff6
-
SHA256
e660fb19e19d060e4021888d7033f17f54f90b339c0ac722ab81708922d7038a
-
SHA512
5cad662f3300120a377164a044c2ecef49ddbde41030ef87aa99dc877d73943d3aa601de23e0c5b7c143c37d82da2ae4202eca33b7c49d321ecf9c2f33c47692
-
SSDEEP
768:6vT2EkMsXq/NdUrA6jRP6MQhKLP5mvrFWju2CkwNoxQj6Eo+xz5Td9+SodZi4Ad:4eXq/NdUrA6jRP6MQhKLP5mvrFWju2CJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e660fb19e19d060e4021888d7033f17f54f90b339c0ac722ab81708922d7038a.xls windows office2003