Behavioral task
behavioral1
Sample
6b4e49f28945a7bbf3c570f0a1177db7ffa9d762ee57c3a3759c5ca7da7adb26.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6b4e49f28945a7bbf3c570f0a1177db7ffa9d762ee57c3a3759c5ca7da7adb26.xls
Resource
win10v2004-20240709-en
General
-
Target
6b4e49f28945a7bbf3c570f0a1177db7ffa9d762ee57c3a3759c5ca7da7adb26
-
Size
53KB
-
MD5
8ddf3c8034a59bc9e34e28e19f927abc
-
SHA1
d242fcb4ac7933c148bb7a3d4b8d940000318ae6
-
SHA256
6b4e49f28945a7bbf3c570f0a1177db7ffa9d762ee57c3a3759c5ca7da7adb26
-
SHA512
432348b0a5f94efa3cf59f74f90c4141a7a7f791f7a9714cc2f8aaa834e82b464dcbd34d6589123921ccf7d5c45d44fa79dea4c0810b5d803a914199be63ac43
-
SSDEEP
384:tOc7fCArSNjeA+ryIkSMe4MTqk6/LcVTNPs+pU6Scti0ajqEELhN5BRCPVry2Zmt:tOcmgryIkSMe4q7WwVBLtNN2Znlztc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6b4e49f28945a7bbf3c570f0a1177db7ffa9d762ee57c3a3759c5ca7da7adb26.xls windows office2003