Behavioral task
behavioral1
Sample
6fc6887822cca68e9abb04719b189aefa36ad62278d45b1ef2ab44791fb10568.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fc6887822cca68e9abb04719b189aefa36ad62278d45b1ef2ab44791fb10568.xls
Resource
win10v2004-20240802-en
General
-
Target
6fc6887822cca68e9abb04719b189aefa36ad62278d45b1ef2ab44791fb10568
-
Size
34KB
-
MD5
ae9f070032d8aabdb20b7c52944d58fb
-
SHA1
2e6b38cc02296800aab98eafb5cb8358d3731fdc
-
SHA256
6fc6887822cca68e9abb04719b189aefa36ad62278d45b1ef2ab44791fb10568
-
SHA512
5ae1c73e79dea990f09446d21f600050ddd199d64b4466728c2a08c6b59c66d8731a08f28f47bbfc91ca2b1a7ac74dfa22a7d625a33ae6d16e4c28799ee13ab5
-
SSDEEP
768:svT2uAOMPbpIH1hkXxQKxyZxJgdAd+56tZpp0N8s3CZwqAKlWiISo2BqN5QqFo1H:bIH1OxQKxy5gdAd+2Zpp0N8s3CZwqAKf
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
6fc6887822cca68e9abb04719b189aefa36ad62278d45b1ef2ab44791fb10568.xls windows office2003