Behavioral task
behavioral1
Sample
69ae9df356e28b7be85dedfe46427618e9067f3e3e1a77f962856a4016e85a94.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
69ae9df356e28b7be85dedfe46427618e9067f3e3e1a77f962856a4016e85a94.xls
Resource
win10v2004-20240709-en
General
-
Target
69ae9df356e28b7be85dedfe46427618e9067f3e3e1a77f962856a4016e85a94
-
Size
43KB
-
MD5
a982d74d2933df186c38d3a66767d1b4
-
SHA1
d578dd08df7ffc4a74a4e12c749f628ad45ac2ba
-
SHA256
69ae9df356e28b7be85dedfe46427618e9067f3e3e1a77f962856a4016e85a94
-
SHA512
a07838bc229045a6748f671723a1dfc07d1f786d29f85f8e3edc93b2ad8b9e0a40307f3b473d6adedde75047c2cc48e1bc01ddab7b9f755ff25030430f31c848
-
SSDEEP
768:HgIqxEtjPOtioVjDGUU1qfDlaGGx+chYIx6twsXyt7c8eAovmdjht7so:AZxEtjPOtioVjDGUU1qfDlaGGx+chYIa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
69ae9df356e28b7be85dedfe46427618e9067f3e3e1a77f962856a4016e85a94.xls windows office2003
Kangatang