Behavioral task
behavioral1
Sample
81b4fda34584da0f941cffce80bc900a55eedcd3fbf545aae8c598353df13109.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
81b4fda34584da0f941cffce80bc900a55eedcd3fbf545aae8c598353df13109.xls
Resource
win10v2004-20240508-en
General
-
Target
81b4fda34584da0f941cffce80bc900a55eedcd3fbf545aae8c598353df13109
-
Size
83KB
-
MD5
6f02824b0549c778c35481bfefbf02a4
-
SHA1
d87bfcf4b5d95b5412de837024c869aa166b25d7
-
SHA256
81b4fda34584da0f941cffce80bc900a55eedcd3fbf545aae8c598353df13109
-
SHA512
5477dac46c55465b9e1265dfcde721f245dccf0a3d2d96f5d05c66bc6f13ec7202dd185d45aba09137534f4be3ef650137c577b5e9b269ee17f80ad85df0bec5
-
SSDEEP
1536:Gopk3hOdsylKlgryzc4bNhZFGzE+jDgLg0dAw9c4n:rk3hOdsylKlgryzc4bNhZFGzE+jDgLg0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
81b4fda34584da0f941cffce80bc900a55eedcd3fbf545aae8c598353df13109.xls windows office2003