Behavioral task
behavioral1
Sample
41889db27452d3972fda5205dfa39ad7af752370e9ab90cb79d4ebedd85ad8c0.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41889db27452d3972fda5205dfa39ad7af752370e9ab90cb79d4ebedd85ad8c0.xls
Resource
win10v2004-20240709-en
General
-
Target
41889db27452d3972fda5205dfa39ad7af752370e9ab90cb79d4ebedd85ad8c0
-
Size
1.6MB
-
MD5
5056eb39f34b56a72ffd5bebe94327da
-
SHA1
2486c0517db6cc89cc42a3d0be148513329fcc7c
-
SHA256
41889db27452d3972fda5205dfa39ad7af752370e9ab90cb79d4ebedd85ad8c0
-
SHA512
fc172f2045db9603d4f6001a366fea4d035e15484127c187d3eeda5fdeb81b33a55ce3f29c693879ee7a0585248d73f895813306b84546d19ba8c51f340d823a
-
SSDEEP
24576:zA3eN5mWA3eN5mIZVrlGuPZAn91ix6uwVe6aPRyPQfN5djyQ9o:zGeFGeMXn9sx6uwVbP6FT9o
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
41889db27452d3972fda5205dfa39ad7af752370e9ab90cb79d4ebedd85ad8c0.xls windows office2003