Behavioral task
behavioral1
Sample
b1bf006b870f1553e5bfc9e7a32fcdfebae0d159a8a364dd9b2039616c7a7689.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1bf006b870f1553e5bfc9e7a32fcdfebae0d159a8a364dd9b2039616c7a7689.xls
Resource
win10v2004-20240709-en
General
-
Target
b1bf006b870f1553e5bfc9e7a32fcdfebae0d159a8a364dd9b2039616c7a7689
-
Size
51KB
-
MD5
be90cfee971ea3a15e8e324a016973a8
-
SHA1
c3a8184b0c32aac85ec2635cc20518a233c847fd
-
SHA256
b1bf006b870f1553e5bfc9e7a32fcdfebae0d159a8a364dd9b2039616c7a7689
-
SHA512
d0e9760e163c8ad2697875ba94d37205b0f20458392df5e8ffa158656e8d3ccee4f9f444fc0b10dd75d4a13ebb821bc9e6ac2fa70be52cae29eee11ab0f91dc1
-
SSDEEP
1536:dck3hOdsylKlgryzc4bNhZFGzE+IIgwtpr27Zaa3:Gk3hOdsylKlgryzc4bNhZFGzE+IIgwt+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b1bf006b870f1553e5bfc9e7a32fcdfebae0d159a8a364dd9b2039616c7a7689.xls windows office2003