Behavioral task
behavioral1
Sample
6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a.xls
Resource
win10v2004-20240226-en
General
-
Target
6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a
-
Size
1.6MB
-
MD5
28d8c94976737103d87a68c3d577f38a
-
SHA1
f89aac36929bdefbc03d2b70e1e5c9f556c0a992
-
SHA256
6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a
-
SHA512
71a1f1d96cab8c7b9ac9a91933cce8b2aaeecb3ef1c7f4733908d6e8d8a5306336c01d0b21d559ebfbff213760d1e8af482e36e9b663e0fdd9e7929f7d270ca7
-
SSDEEP
12288:6hPMqVd/wUxd9ybvciopY9FnhULhftogqbIKeY+yg3Ciw1d74Zj:6NlRLmLhi3dU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a.xls windows office2003