Behavioral task
behavioral1
Sample
49f1b31ecf88aaadeae5af5f2bbbc582c4f29ffc04ae504a466d6f7b7c0bbccc.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49f1b31ecf88aaadeae5af5f2bbbc582c4f29ffc04ae504a466d6f7b7c0bbccc.xls
Resource
win10v2004-20240709-en
Errors
General
-
Target
49f1b31ecf88aaadeae5af5f2bbbc582c4f29ffc04ae504a466d6f7b7c0bbccc
-
Size
34.2MB
-
MD5
ff3337093b3339988d7c69cf507900ac
-
SHA1
acccc7d187fee6a3fafd109ed65fea436b0ea7ba
-
SHA256
49f1b31ecf88aaadeae5af5f2bbbc582c4f29ffc04ae504a466d6f7b7c0bbccc
-
SHA512
9bd0d3fdeb4d526c9eea2476e4b60e8a1a514c265c8d8f69777ba5aa77bc5f34c0a45f87b5f13d979d8b8d9d8aa7068b6d1e68b818cbae775982e86e68ba2afe
-
SSDEEP
12288:xoXoN96yPnaAxwcwoS1gqwJ4XZsFPqzzR1y3vXF9XcaqCjHWJOX4iKqU38mZw9hw:eXurn+mrmRz6fd7P9h9ma
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
49f1b31ecf88aaadeae5af5f2bbbc582c4f29ffc04ae504a466d6f7b7c0bbccc.xls windows office2003