Behavioral task
behavioral1
Sample
d91991b5e6ec410243c40dc490dfc8f1d0c281e4555246d77f223f8ded406c23.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d91991b5e6ec410243c40dc490dfc8f1d0c281e4555246d77f223f8ded406c23.xls
Resource
win10v2004-20240508-en
General
-
Target
d91991b5e6ec410243c40dc490dfc8f1d0c281e4555246d77f223f8ded406c23
-
Size
295KB
-
MD5
821593d995e27c8c9446d997a7ca4a7a
-
SHA1
3f820938355189f05852050546602fc2e49cacfa
-
SHA256
d91991b5e6ec410243c40dc490dfc8f1d0c281e4555246d77f223f8ded406c23
-
SHA512
2017e02d2bf79e24824aa912bfd2ed265ebc67b16aec78e874b2306efb6ed8e4907291b1bda9278be0f8e34693fcce936dd2c43bb9400e9597916fff53c73d88
-
SSDEEP
6144:CX+T9d0jEejZz+MIF+lvLeyVtnYB3Y9weNwqtRYmZx0HTUGBMVM3r:IlYm7kIGBt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d91991b5e6ec410243c40dc490dfc8f1d0c281e4555246d77f223f8ded406c23.xls windows office2003