Behavioral task
behavioral1
Sample
73559d5a7869a0f68efde61978514c92f9800aad924f819dbd9cebd8fb68a3e8.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
73559d5a7869a0f68efde61978514c92f9800aad924f819dbd9cebd8fb68a3e8.xls
Resource
win10v2004-20240508-en
General
-
Target
73559d5a7869a0f68efde61978514c92f9800aad924f819dbd9cebd8fb68a3e8
-
Size
295KB
-
MD5
1211a326e4eb3a1646766293776bb11b
-
SHA1
6b8aa8a9593f925d903f3c1c8f60e28829fe3a46
-
SHA256
73559d5a7869a0f68efde61978514c92f9800aad924f819dbd9cebd8fb68a3e8
-
SHA512
bec93ec42058d8771646e47fa19dfdf12275335ac2cc131296c9df547f2fd94c74f57e84f29a21213b7131b154cc16ec896dcb6d3f0b346efec8de23f5ad4868
-
SSDEEP
6144:+X+T9d0jEejZz+MIF+lvLeyVtnYB3Y9weNwqtRYmZx0HTUGBMVM3r:0lYm7kIGBt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
73559d5a7869a0f68efde61978514c92f9800aad924f819dbd9cebd8fb68a3e8.xls windows office2003