Behavioral task
behavioral1
Sample
16f19fc1a52b5c21444b0679489a221bfc0b45aa134b7bb787ed867ba36779f1.xls
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
16f19fc1a52b5c21444b0679489a221bfc0b45aa134b7bb787ed867ba36779f1.xls
Resource
win10v2004-20240508-en
General
-
Target
16f19fc1a52b5c21444b0679489a221bfc0b45aa134b7bb787ed867ba36779f1
-
Size
3.7MB
-
MD5
002f9d04cf8a270dd37e287b0772147d
-
SHA1
8e190ae0e79120c30a53419b45bfe8aefaddbd16
-
SHA256
16f19fc1a52b5c21444b0679489a221bfc0b45aa134b7bb787ed867ba36779f1
-
SHA512
3cda477649841f79e0f1fe3305e833e883d954155c06c3b3a610ea0b5660aeb65dd2732c13ce71e413ecbde3fbad019139083050d8cffc3c4cb1f6f36e0d6a1c
-
SSDEEP
6144:rk3hbdlylKsgqopeJBWhZFVE+W/lGARuz93e3:Cho
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
16f19fc1a52b5c21444b0679489a221bfc0b45aa134b7bb787ed867ba36779f1.xls windows office2003