Behavioral task
behavioral1
Sample
f02b00b46df63387b67160d93fbaa9f78e9890215757610c40c087ffb87cbc26.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f02b00b46df63387b67160d93fbaa9f78e9890215757610c40c087ffb87cbc26.xls
Resource
win10v2004-20240508-en
General
-
Target
f02b00b46df63387b67160d93fbaa9f78e9890215757610c40c087ffb87cbc26
-
Size
148KB
-
MD5
623a34e767d9f84abf9ced29ffc07778
-
SHA1
e0ac49a57384d8c586d6ec94a1c176aced056eb4
-
SHA256
f02b00b46df63387b67160d93fbaa9f78e9890215757610c40c087ffb87cbc26
-
SHA512
17be271888a00e992da899e3827e9329f7501792bcaf35da61242259f5e5d42572d73505378c2da810ad9be7243ec5f45a6a5327fcde9688a4e017dd051eaec3
-
SSDEEP
3072:Ebnk3hOdsylKlgxopeiBNhZFGzE+cmWxM3JAKhkFSGWWFqU4vpx+wLjGXY/axOMz:Ebnk3hOdsylKlgxopeiBNhZF+E+DWxM7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f02b00b46df63387b67160d93fbaa9f78e9890215757610c40c087ffb87cbc26.xls windows office2003