Behavioral task
behavioral1
Sample
000bb1d161d7c8b6dec09139c390022b0fed06290c66734759e1147ff4a2c02a.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
000bb1d161d7c8b6dec09139c390022b0fed06290c66734759e1147ff4a2c02a.xls
Resource
win10v2004-20240226-en
General
-
Target
000bb1d161d7c8b6dec09139c390022b0fed06290c66734759e1147ff4a2c02a
-
Size
140KB
-
MD5
8920f8bfd6f234f2bce817c368a2843a
-
SHA1
16d9c521054b68babcfb5505fe30ffe20331a0c4
-
SHA256
000bb1d161d7c8b6dec09139c390022b0fed06290c66734759e1147ff4a2c02a
-
SHA512
2d4fa0c2ffb0488c19c278f0d1034d32eb7bbb5ea28f4e230457a770511aae77404838011cc7033c9605480d03ebdfd128daa050ef25055f257eadd965e5d2ef
-
SSDEEP
3072:0rXk3hbdlylKsgwyzcTbWhZFGkE+kDaxHmaELakVepeQJIqT6eGVfeLtz9GWQrf2:0jk3hbdlylKsgwyzcTbWhZFVE+WaxHFZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
000bb1d161d7c8b6dec09139c390022b0fed06290c66734759e1147ff4a2c02a.xls windows office2003