Behavioral task
behavioral1
Sample
e7e219fd184b0215058365487106dc0ece0e25728baef8242464b8b5ad8d23aa.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e7e219fd184b0215058365487106dc0ece0e25728baef8242464b8b5ad8d23aa.xls
Resource
win10v2004-20240709-en
General
-
Target
e7e219fd184b0215058365487106dc0ece0e25728baef8242464b8b5ad8d23aa
-
Size
1.8MB
-
MD5
171dc0d88362f64485a8913b7354f05d
-
SHA1
10484fce7aa68aa40c7b351ea896aeb182cd1768
-
SHA256
e7e219fd184b0215058365487106dc0ece0e25728baef8242464b8b5ad8d23aa
-
SHA512
274fa291cb3653aba212f353ea77bd2ee7cfefacc89245b92ccb5308aab97b9bf6fa4bd500ba59da201f55ee258e637aacd25a35ca95234e0eef2b9978424900
-
SSDEEP
49152:S0lfkWCaz776Tum207T5G/xpr/UK2FSYc/EIbM:SuhziVD/qxpr/UzFO/EC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e7e219fd184b0215058365487106dc0ece0e25728baef8242464b8b5ad8d23aa.xls windows office2003