Behavioral task
behavioral1
Sample
0e8b06ec16a9a0469d6ead6519fd4b538a00b7acbe2a3cea28898c9651d51647.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0e8b06ec16a9a0469d6ead6519fd4b538a00b7acbe2a3cea28898c9651d51647.xls
Resource
win10v2004-20240508-en
General
-
Target
0e8b06ec16a9a0469d6ead6519fd4b538a00b7acbe2a3cea28898c9651d51647
-
Size
265KB
-
MD5
4aeab9143101132ded672f6af28359d4
-
SHA1
63c572e1a477196d2c71df8253d7331db140fc6e
-
SHA256
0e8b06ec16a9a0469d6ead6519fd4b538a00b7acbe2a3cea28898c9651d51647
-
SHA512
263050d8fa0dc9a057461743ca236a31d22590e5564b6d8a680f7dce0f56a4ed3b60df57ab20bead72e64b87d972198f6c23d1bfe0205e6c1d02c7b6807f8031
-
SSDEEP
6144:LxER/vep2wFvHGMIB6tZjA5bTzrj7B/axfmgLWtQnitIfWJUruxkbCVg3eV4jy5P:t3h2C8aYC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0e8b06ec16a9a0469d6ead6519fd4b538a00b7acbe2a3cea28898c9651d51647.xls windows office2003