Behavioral task
behavioral1
Sample
616fcd10f5db02f98b68c88948062befabad4c13bee8b921c7d8f7d44a220beb.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
616fcd10f5db02f98b68c88948062befabad4c13bee8b921c7d8f7d44a220beb.xls
Resource
win10v2004-20240709-en
General
-
Target
616fcd10f5db02f98b68c88948062befabad4c13bee8b921c7d8f7d44a220beb
-
Size
1.8MB
-
MD5
9071a68c9a5e39bbe8f7003f3e70ca23
-
SHA1
76b6e22d58b817d21ad0183be9d80f4c5a254e75
-
SHA256
616fcd10f5db02f98b68c88948062befabad4c13bee8b921c7d8f7d44a220beb
-
SHA512
6d9078aef735f60e665b80480281f1aa2ae08aae6a2a15672f294294f4f5240a327c2cd8fc8c4a3c008ca820e5c0f370b76978a209ae27cb1d81a46a96c4e72c
-
SSDEEP
49152:d0lfkWCaz776Tum207T5G/xpr/UK2FSYc/EIbM:duhziVD/qxpr/UzFO/EC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
616fcd10f5db02f98b68c88948062befabad4c13bee8b921c7d8f7d44a220beb.xls windows office2003