Behavioral task
behavioral1
Sample
fda190b11ab01a7a434bb6a2408a6cbb4bbfc4b3a2eb4af7b1b9c3b10c24a067.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fda190b11ab01a7a434bb6a2408a6cbb4bbfc4b3a2eb4af7b1b9c3b10c24a067.xls
Resource
win10v2004-20240704-en
General
-
Target
fda190b11ab01a7a434bb6a2408a6cbb4bbfc4b3a2eb4af7b1b9c3b10c24a067
-
Size
34KB
-
MD5
81ae70fe4ed226d09a9d74b2cdbc5cc1
-
SHA1
aea1be6930c73283bcbf766f0d05e743c43520c8
-
SHA256
fda190b11ab01a7a434bb6a2408a6cbb4bbfc4b3a2eb4af7b1b9c3b10c24a067
-
SHA512
002835a538d0d90b0e653d8c8e9ca63b20a2d82a4ef319c9c6214c8611ece0b1658d72817208eed4a13eb6d1cf0c8a72b4aca439bb406012492386654443216a
-
SSDEEP
768:LveWFwP+SKabAk0BuqCXlg+/fs5cClfZw2gmVXqA4LQYgO1mQQpSFeVAmcil:LSP+SKabAk0BuqCXlg+/fs5cClfZw2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fda190b11ab01a7a434bb6a2408a6cbb4bbfc4b3a2eb4af7b1b9c3b10c24a067.xls .vbs windows office2003 polyglot