Behavioral task
behavioral1
Sample
8230f130bacb2699764e909eab2d8ac716e21301d2937f3124a051cf1a11def8.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8230f130bacb2699764e909eab2d8ac716e21301d2937f3124a051cf1a11def8.xls
Resource
win10v2004-20240704-en
General
-
Target
8230f130bacb2699764e909eab2d8ac716e21301d2937f3124a051cf1a11def8
-
Size
34KB
-
MD5
c9d07d6d512f002edfecf66c280b2f7e
-
SHA1
318cc293498a6813c4e688a800a3be271adfa6ef
-
SHA256
8230f130bacb2699764e909eab2d8ac716e21301d2937f3124a051cf1a11def8
-
SHA512
77a311d8adf1a252f2688036f2d2a046e7b8467553bb87d9512ca3e85cad21d8d4f7cfa56a2b218dc5370a72b5c2c34cb7f808edf0f7e8e615cd219f0ab1c7b8
-
SSDEEP
768:bveWFwP+SKabAk0BuqCXlg+/fs5cClfZw2gmVXqA4LQYgO1mQQpSFeVAmcil:bSP+SKabAk0BuqCXlg+/fs5cClfZw2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8230f130bacb2699764e909eab2d8ac716e21301d2937f3124a051cf1a11def8.xls .vbs windows office2003 polyglot