Behavioral task
behavioral1
Sample
49b10a2469a61bc3be969b17c2a242d91d6808f34e25941f8143b6a2dd2c413d.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
49b10a2469a61bc3be969b17c2a242d91d6808f34e25941f8143b6a2dd2c413d.xls
Resource
win10v2004-20240508-en
General
-
Target
49b10a2469a61bc3be969b17c2a242d91d6808f34e25941f8143b6a2dd2c413d
-
Size
140KB
-
MD5
6f5271edd64174dc1b76fcb1ef351b89
-
SHA1
de92eddd7fc7d429a497d06a9f7756f59015af31
-
SHA256
49b10a2469a61bc3be969b17c2a242d91d6808f34e25941f8143b6a2dd2c413d
-
SHA512
0d71b078296df4da7583a24cb4d002b720a241d97d4e80a8f36558b17b583f309ccc402bd5baebaec4e59268a615bad3e86c6f0941281421282bddfc32e5cc3b
-
SSDEEP
3072:krXk3hbdlylKsgwyzcTbWhZFGkE+kDaxHmaELakVepeQJIqT6eGVfeLtz9GWQrf2:kjk3hbdlylKsgwyzcTbWhZFVE+WaxHFZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
49b10a2469a61bc3be969b17c2a242d91d6808f34e25941f8143b6a2dd2c413d.xls windows office2003