Behavioral task
behavioral1
Sample
5519a888984f4f15b6a2a8527b7add8c41c2782cfe1451f717394474476315a6.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5519a888984f4f15b6a2a8527b7add8c41c2782cfe1451f717394474476315a6.xls
Resource
win10v2004-20240508-en
General
-
Target
5519a888984f4f15b6a2a8527b7add8c41c2782cfe1451f717394474476315a6
-
Size
53KB
-
MD5
a73f99e4e9354dee244c78197f7da812
-
SHA1
295316129bb01bdd4dc16685a5174ed83b9fe01e
-
SHA256
5519a888984f4f15b6a2a8527b7add8c41c2782cfe1451f717394474476315a6
-
SHA512
7675a9817fc31bb6ecf9edde19821f16878bab45140271389a7fbb65bf1918335ef06655e0ac5ea34c26a32aefea4ca9d35c8d7bbf9db334d7bbc952c652da50
-
SSDEEP
1536:/zZrZnBAKYP+I6LNThTtJP1nBfKNFktk3hbdlylKsgqopeJBWhZFGkE+cLax9AX7:/zZrZnBAKo+I6LNThTtJP1nBfKNFktkm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
5519a888984f4f15b6a2a8527b7add8c41c2782cfe1451f717394474476315a6.xls windows office2003