Behavioral task
behavioral1
Sample
28c6aa480f3d88ebc14100fa99147b99619f8ec690ad55987324529fd2ad512c.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28c6aa480f3d88ebc14100fa99147b99619f8ec690ad55987324529fd2ad512c.xls
Resource
win10v2004-20240709-en
General
-
Target
28c6aa480f3d88ebc14100fa99147b99619f8ec690ad55987324529fd2ad512c
-
Size
40KB
-
MD5
f226b65c91a4d039e5623ec956f0572f
-
SHA1
c7ac2890d5e02f82864d869293960c5be7bd3554
-
SHA256
28c6aa480f3d88ebc14100fa99147b99619f8ec690ad55987324529fd2ad512c
-
SHA512
f32e588363437ca6650b6c72b0f9bfdc6a795d31c5eb4b489a47e79e940ec1ae1cbfe5d6a9d75d4087edb31e770bbd5c03b97f263d8191608ba4b1cb7d768d51
-
SSDEEP
768:UM0oSxEtjPOtioVjDGUU1qfDlaGGx+kD/IEyfZspo7bpxzeOXKjRSeA1rvr6xtxT:/SxEtjPOtioVjDGUU1qfDlaGGx+kD/IN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
28c6aa480f3d88ebc14100fa99147b99619f8ec690ad55987324529fd2ad512c.xls windows office2003