Behavioral task
behavioral1
Sample
54b788234caa8d686afa64858994738a180df882a411a49fe2b0effd683d6708.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
54b788234caa8d686afa64858994738a180df882a411a49fe2b0effd683d6708.xls
Resource
win10v2004-20240802-en
General
-
Target
54b788234caa8d686afa64858994738a180df882a411a49fe2b0effd683d6708
-
Size
8.1MB
-
MD5
90b926b4ce44346154a790c030c3a5bd
-
SHA1
ccfdcfe077c9cd23931be1d07d38edc24720ebe6
-
SHA256
54b788234caa8d686afa64858994738a180df882a411a49fe2b0effd683d6708
-
SHA512
6cab466bdf45b48b4f9414ce078e45b50a00490f0093cfb74ffc3ddbf8be7ed0a6d8452d2d323a07e3b9458a493a08b082bc3011e287f19d85250516523f4de4
-
SSDEEP
196608:NQCvdSJwgOqKglt11SVyBal99SQbQZw9Tyje1Sq8BQdHj/J:NQCkJOdgR1mQi9REO6JqG2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
54b788234caa8d686afa64858994738a180df882a411a49fe2b0effd683d6708.xls windows office2003
Kangatang