Behavioral task
behavioral1
Sample
2d166d09614a0012d413a20f787314bb9abc542d9417e978e763074308414e8f.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d166d09614a0012d413a20f787314bb9abc542d9417e978e763074308414e8f.xls
Resource
win10v2004-20240709-en
General
-
Target
2d166d09614a0012d413a20f787314bb9abc542d9417e978e763074308414e8f
-
Size
66KB
-
MD5
672a78f8dcc67fa4f3297c2738263ae0
-
SHA1
347a355635bc67b37d187c49b1707080c84bd9fd
-
SHA256
2d166d09614a0012d413a20f787314bb9abc542d9417e978e763074308414e8f
-
SHA512
85c0a356fe9edc1c31d5c44bd81a03316cb32cce06f6f721744b89401d6adc30b1caf092f841ffe30f4450287c369383ad69515dd49f24d2faa1dad2bc9fa9d5
-
SSDEEP
1536:qjxEtjPOtioVjDGUU1qfDlaGGx+fdwI5tNhRlnYOdpSIC9dX6:qjxEtjPOtioVjDGUU1qfDlaGGx+fdwIt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2d166d09614a0012d413a20f787314bb9abc542d9417e978e763074308414e8f.xls windows office2003