Behavioral task
behavioral1
Sample
8ec945761752cd9c32af413064901341b1632eee23ad0c124ea89ce904d858c8.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8ec945761752cd9c32af413064901341b1632eee23ad0c124ea89ce904d858c8.xls
Resource
win10v2004-20240611-en
General
-
Target
8ec945761752cd9c32af413064901341b1632eee23ad0c124ea89ce904d858c8
-
Size
59KB
-
MD5
a387488b9b2824b0a1493d0f69ab59e9
-
SHA1
c0adea8a12dc84ebbc8fb5292122edaf2934e1d8
-
SHA256
8ec945761752cd9c32af413064901341b1632eee23ad0c124ea89ce904d858c8
-
SHA512
43d42819ccf4cd14fdcfc13d8e243c2917d3769011b1e3292ba0514e8313f3bfe73816290ce67cced5591af147f5523d5643acfa4b0f0c8632e40cd5e9f760b0
-
SSDEEP
1536:oCClIwwk3hbdlylKsgwyzcTbWhZFGkE+cL/xEogSvje6SRdpzlG/:+wk3hbdlylKsgwyzcTbWhZFGkE+cL/xo
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8ec945761752cd9c32af413064901341b1632eee23ad0c124ea89ce904d858c8.xls windows office2003
Kangatang