Behavioral task
behavioral1
Sample
bf6d7fc5c97c68734f57788b0b07d336ac18bab583380b95da176ed265846b81.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf6d7fc5c97c68734f57788b0b07d336ac18bab583380b95da176ed265846b81.xls
Resource
win10v2004-20240709-en
General
-
Target
bf6d7fc5c97c68734f57788b0b07d336ac18bab583380b95da176ed265846b81
-
Size
61KB
-
MD5
2b64883b27e9095f231f5f0c39aaad79
-
SHA1
3b23edcfc9b2b2e8f8a3fb0f5671c33002d1293f
-
SHA256
bf6d7fc5c97c68734f57788b0b07d336ac18bab583380b95da176ed265846b81
-
SHA512
d1dd1a731fa59e32ed7d29f4334c12b57a3c648e023d0a3a660bbc7c5f77d6c54260c86c263ee826fec67867bfee655bf9db89d29a45d04ead05da9a46cf2243
-
SSDEEP
1536:IF/OGfvAk3dS9cW5y1EXyr48LvH/7MOTzrjlEsVYem6tmqkiLmXshzylodcaMSMn:IFOGfvAk3dS9cW5y1EXyr48LvH/7MOT8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bf6d7fc5c97c68734f57788b0b07d336ac18bab583380b95da176ed265846b81.xls windows office2003