Behavioral task
behavioral1
Sample
6ab255ae773c83eba6f9dd5faf1bd098350283a4ec786b1496bc1bc1265acc10.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6ab255ae773c83eba6f9dd5faf1bd098350283a4ec786b1496bc1bc1265acc10.xls
Resource
win10v2004-20240508-en
General
-
Target
6ab255ae773c83eba6f9dd5faf1bd098350283a4ec786b1496bc1bc1265acc10
-
Size
55KB
-
MD5
00bbbd0fbd90b3de70dc308cdf0a6fef
-
SHA1
9195f6265535aef79b2d8c86e020383628f00b9b
-
SHA256
6ab255ae773c83eba6f9dd5faf1bd098350283a4ec786b1496bc1bc1265acc10
-
SHA512
800878670a508768b3b976a272d11c6e9d43e2659f82d1dbd07bc322a63de5a613dd0f71ffe8fe52f56ef53aed4f35ddcbffe17bd71324c066841d41bfd950a1
-
SSDEEP
1536:kggg0400mBB5UCBdymRxoiVKTMpE2Gb6eqsh81N8Pkt+UXspN3o8s3SwqgKo0lRz:iGb6eqsh81N8Pkt+UXsRs3SwqgKo0lRz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6ab255ae773c83eba6f9dd5faf1bd098350283a4ec786b1496bc1bc1265acc10.xls windows office2003