Behavioral task
behavioral1
Sample
25e4ffaa41e6343fae3f1461419a4f0e9badd27b547bb24cd601c818fc7fc536.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
25e4ffaa41e6343fae3f1461419a4f0e9badd27b547bb24cd601c818fc7fc536.xls
Resource
win10v2004-20240709-en
General
-
Target
25e4ffaa41e6343fae3f1461419a4f0e9badd27b547bb24cd601c818fc7fc536
-
Size
208KB
-
MD5
e095e245a224099d2edf88ee5455d65e
-
SHA1
f5d539b46f016c244165d359d0870e830b0ac1b0
-
SHA256
25e4ffaa41e6343fae3f1461419a4f0e9badd27b547bb24cd601c818fc7fc536
-
SHA512
184749db3e0de3575003d7900f440eb136ae761e3885cf07191fc20eafe9a591493595e0cd99693bbd979f5dbd3a8e5f34f9d9edb8dac5d1d00a4020d489f927
-
SSDEEP
6144:I5vFf5su4ukujlvFztVzNfNjHD3DBk3hOdsylKlgxopeiBNhZF+E+oWxM3JAduFj:mlRzR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
25e4ffaa41e6343fae3f1461419a4f0e9badd27b547bb24cd601c818fc7fc536.xls windows office2003