Behavioral task
behavioral1
Sample
d5b30e5943e46013e50d0cd057eb6ef6efe528e007df8b4014298b605f34d73f.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d5b30e5943e46013e50d0cd057eb6ef6efe528e007df8b4014298b605f34d73f.xls
Resource
win10v2004-20240508-en
General
-
Target
d5b30e5943e46013e50d0cd057eb6ef6efe528e007df8b4014298b605f34d73f
-
Size
30KB
-
MD5
1bae5162d07618653332b6319ff31094
-
SHA1
bea5ee5e890d7582e023fb50c1f8787fa4e57d42
-
SHA256
d5b30e5943e46013e50d0cd057eb6ef6efe528e007df8b4014298b605f34d73f
-
SHA512
bb786679ae8a960cc8879a4ea4449cfb557f43d63967aff602dda78c4914b095e619376a18f85ae3d62323a5ebba17ab61ef695520ec38fddef681aeb3ed89ca
-
SSDEEP
768:lUqyvLLmk3hOdsylKlgryzc4bNhZFGzE+cW/gEAlt9nFRsX:Zk3hOdsylKlgryzc4bNhZFGzE+cW/gEr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d5b30e5943e46013e50d0cd057eb6ef6efe528e007df8b4014298b605f34d73f.xls windows office2003
KING