Behavioral task
behavioral1
Sample
d130b9b6e9d99e016fab5cbfcf85c57daecd08d8ba8103715150c81eeeee0a59.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d130b9b6e9d99e016fab5cbfcf85c57daecd08d8ba8103715150c81eeeee0a59.xls
Resource
win10v2004-20240709-en
General
-
Target
d130b9b6e9d99e016fab5cbfcf85c57daecd08d8ba8103715150c81eeeee0a59
-
Size
44KB
-
MD5
1a77f01c1051bbbef0c7afad6936969b
-
SHA1
5ce3900f7f65b74021138331819f3e90521e3be2
-
SHA256
d130b9b6e9d99e016fab5cbfcf85c57daecd08d8ba8103715150c81eeeee0a59
-
SHA512
a2e380b640240d30d5c1b18a332b54167562177e95c0cb35b966a2c1b946c49a33cd170be96d492b734154c7530938568ae7800baf71a142b1cebd909a59b2db
-
SSDEEP
384:LUm0WhC/9zybZN5iS9yFGZv2x8rW9oXS5kT+lQ/6hM7mN4fJ0jO1gPKxcL2dI3yG:LHIzybZJsCBNk4p0Na36
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d130b9b6e9d99e016fab5cbfcf85c57daecd08d8ba8103715150c81eeeee0a59.xls windows office2003