Behavioral task
behavioral1
Sample
57f178c884135674056145492209b7c19694f8af6567e8627dc2580c51842409.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
57f178c884135674056145492209b7c19694f8af6567e8627dc2580c51842409.xls
Resource
win10v2004-20240802-en
General
-
Target
57f178c884135674056145492209b7c19694f8af6567e8627dc2580c51842409
-
Size
652KB
-
MD5
392ad2b7790b9b5030e7eb8a067519ec
-
SHA1
a612c01114f11111d7a0478b70b6e06f3da8a640
-
SHA256
57f178c884135674056145492209b7c19694f8af6567e8627dc2580c51842409
-
SHA512
8679d1ecab12adde211876f06155a016113ef5321a5dea0f9b5f53bdcb941c69e552a2f581e99ee19d4f1266184e252fa18342ea9a690097747fa95be4608274
-
SSDEEP
3072:2PPPPctEU5UfsEY2HWUUZHPMixhtumlskJJQ40nEg9IMRVRLMyenUdqcm/id0edC:BJURIjxLumakJj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
57f178c884135674056145492209b7c19694f8af6567e8627dc2580c51842409.xls windows office2003