Behavioral task
behavioral1
Sample
49c2cdeee50753cb605ea143c60a6be617a16ec769ac9753a2ebe0387f537661.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49c2cdeee50753cb605ea143c60a6be617a16ec769ac9753a2ebe0387f537661.xls
Resource
win10v2004-20240704-en
General
-
Target
49c2cdeee50753cb605ea143c60a6be617a16ec769ac9753a2ebe0387f537661
-
Size
35KB
-
MD5
220ff010a460463dc1272c5553ba021e
-
SHA1
b307b11510811ce354e9f76997136e02c0243de8
-
SHA256
49c2cdeee50753cb605ea143c60a6be617a16ec769ac9753a2ebe0387f537661
-
SHA512
e89b3166d4ecf6f04ad39b477b064dbd8500782898085fe87f67dda34bc5021d32ff83b78353dac64161fce0520e6db6d723df0b517db417acd9fd2bfcacc88d
-
SSDEEP
768:btvo+tzRk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJRqW2id93:LTk3hbdlylKsgqopeJBWhZFGkE+cL2N+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
49c2cdeee50753cb605ea143c60a6be617a16ec769ac9753a2ebe0387f537661.xls .vbs windows office2003 polyglot
ThisWorkbook
Hoja1
Módulo1