Behavioral task
behavioral1
Sample
60c5323ae7407085e0cabb8b3ad9812557a62a2d1cff9870fb8b30ce3b150997.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
60c5323ae7407085e0cabb8b3ad9812557a62a2d1cff9870fb8b30ce3b150997.xls
Resource
win10v2004-20240508-en
General
-
Target
60c5323ae7407085e0cabb8b3ad9812557a62a2d1cff9870fb8b30ce3b150997
-
Size
121KB
-
MD5
f6af8a742e1a7e0eb2d552ccff352a85
-
SHA1
479b01db051b2e11fb9546571267e533fd1ac5e3
-
SHA256
60c5323ae7407085e0cabb8b3ad9812557a62a2d1cff9870fb8b30ce3b150997
-
SHA512
139173e6db210d89e991c0a1134560ae2d090e64e1edb961ae8192830c733381452e22cf5d1af1553b1e20ce5c66f4aaee1315b9c82b879abd94f44ea02891b5
-
SSDEEP
3072:UcKoSsxzNDZLDZjlbR868O8KlVH37kehvMqAPjxO5xyZUE5V5xtezEVg8/dgiBFw:UcKoSsxzNDZLDZjlbR868O8KlVH37keH
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
60c5323ae7407085e0cabb8b3ad9812557a62a2d1cff9870fb8b30ce3b150997.xls windows office2003
Fbhndfghsret3
GhFdrtdSrt4ufg
kjDygzs34e